General

  • Target

    2024-02-12_f9ab4759335a599fce9e35a801adbd69_cryptolocker

  • Size

    79KB

  • MD5

    f9ab4759335a599fce9e35a801adbd69

  • SHA1

    cf270a1bea1274272956aa350190923b2017115f

  • SHA256

    e282406ccb82ff734e07da79afb8b4cca3e69d644f7cf549a1ff33bcf0838e35

  • SHA512

    117a002f01938dd4e10bcac64f5913b88a8b33c4695fca56f12f243c04bf54ad30431312d45a1eb5cc84ec68c236139a685ba0e5129bae6591f054f67d1c6f7f

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyTgiL:zCsanOtEvwDpjI

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_f9ab4759335a599fce9e35a801adbd69_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections