General

  • Target

    2024-01-28_9e45c24c5037c8c6501462cd10ba9aad_cryptolocker

  • Size

    90KB

  • MD5

    9e45c24c5037c8c6501462cd10ba9aad

  • SHA1

    8d056946546967963f8297be209bb6dfc86f1cbb

  • SHA256

    4e7b2c706cc2063a42fbf0401b975d38ce9883ab1953217cd3895297cc01fe0a

  • SHA512

    600d8aa878d2de47983765bc16e9e312a804de162606d88f4fcfc034082a40218e192a84ef2bca360b74a9092eddd8e681c8840e8265e55cb206114c07c7dcc6

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRMy87n:zCsanOtEvwDpjn

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-28_9e45c24c5037c8c6501462cd10ba9aad_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections