General

  • Target

    2024-01-29_9df5a2bf0ddbb6c68579c3cda1d4b60e_cryptolocker

  • Size

    80KB

  • MD5

    9df5a2bf0ddbb6c68579c3cda1d4b60e

  • SHA1

    7a1b881b539571843c483cc5158a0ff95ad8aa34

  • SHA256

    aca63c493abfc8e14adc9cc82022199f2ed1a7d9710a5ff6933013f888aa471a

  • SHA512

    29fe570bceceef7da1dddb88122f4e9ccc7a006a121985fe85dc01000299d9adee8141d19e9ec08efbbc12771d79e542589674f57146ddec56234a3e84d30d44

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7W+:T6a+rdOOtEvwDpjNz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-29_9df5a2bf0ddbb6c68579c3cda1d4b60e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections