General

  • Target

    2024-02-04_b9aa684d0317ce3ff3f4ead8acc9926a_cryptolocker

  • Size

    56KB

  • MD5

    b9aa684d0317ce3ff3f4ead8acc9926a

  • SHA1

    b7c56aa3c544ceb0d314a651c4d2f348f1958bc1

  • SHA256

    7db6bcc6a7c98b57b8bb99e5bc2c6beba2d658f20b6bba5ca52b0fbe659b5a03

  • SHA512

    fbf9b5f0e1d86e78f2c6a0d111a4c8056b944c2bd3153b3785946e1eaf51b2197cebd449d7203504a857cfda6e60c5975e0bfa599bc17b3a3e04bc5e9fc2fe8a

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpy9fH:zj+soPSMOtEvwDpj4yqH

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_b9aa684d0317ce3ff3f4ead8acc9926a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections