General

  • Target

    2024-01-25_9a42d4005436a86ec3cb31c54acba417_cryptolocker

  • Size

    79KB

  • MD5

    9a42d4005436a86ec3cb31c54acba417

  • SHA1

    50c5d1439358c7cc83d9c2962d3f6e161518505c

  • SHA256

    9900322cab846e134937e3d56b3b97f5c9a317b65f29a23d1726c60b33e78b71

  • SHA512

    7d8eea486b00954cd320582c941402f67b82ffbc8bb3b689c80546f5d539ec05c94ec6d94d480ebfaac8188b6979341f54a1ac2061a7bcede8e16c204413939d

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdL:T6a+rdOOtEvwDpjNtd

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-25_9a42d4005436a86ec3cb31c54acba417_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections