General

  • Target

    2024-01-24_8c9e9a84d5522678e07d43ba99f40b68_cryptolocker

  • Size

    55KB

  • MD5

    8c9e9a84d5522678e07d43ba99f40b68

  • SHA1

    f640de7f6a853d8a3fcb525524275202c431135e

  • SHA256

    867fda73677b5156fc931ba1ab8328aa069c8222d34f8481139a519aebd37860

  • SHA512

    e287985f1681513f42663721427356cf806166ad28402c2ac656a4047c9148ee902d5f6ce0ff765769e10a852c7181751eec6882de046acd921ec6df342295dd

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5apJ:z6QFElP6n+gKmddpMOtEvwDpj9aYaX

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-24_8c9e9a84d5522678e07d43ba99f40b68_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections