General

  • Target

    2024-02-11_9775cc0ce30103b06983e500c4174b2f_cryptolocker

  • Size

    79KB

  • MD5

    9775cc0ce30103b06983e500c4174b2f

  • SHA1

    134f38d536262c561fcce06d612f7de3c62f6c66

  • SHA256

    4f02f60a80f4979954a244d3c457692abbc6854f0fc0b30630809b124e245247

  • SHA512

    8517070b7988ce0698a58b08074609b3c17687cd0aa22cbad2539639767029a3ca0f98c4dff8df606b25e0206aa85c9933daf578aca3859e42d6bb65c6284f0a

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd0byz:T6a+rdOOtEvwDpjNtW+

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-11_9775cc0ce30103b06983e500c4174b2f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections