General

  • Target

    2024-02-04_9820f3f748c0bd8878e3f49881b1160c_cryptolocker

  • Size

    65KB

  • MD5

    9820f3f748c0bd8878e3f49881b1160c

  • SHA1

    06eb1107585d37a25f7a5d5e7b083bbf9bfea6bf

  • SHA256

    a0e92a5bc60f118cd4e2710716e1e173abffd40a6924a835ce15d16c3923cdbc

  • SHA512

    8f9bd99c879b1351455002024312a9d409c44626b25375c6b4195d1fd9f4bea52313f7407af994b1ace8bf48126496633c00944b19a7c57686595727eff34c89

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6Uy:1nK6a+qdOOtEvwDpjD

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_9820f3f748c0bd8878e3f49881b1160c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections