General

  • Target

    2024-02-14_8d9a8335fc389b0b7093db2ba2f32609_cryptolocker

  • Size

    104KB

  • MD5

    8d9a8335fc389b0b7093db2ba2f32609

  • SHA1

    17334cbb37646e5835b50aa2d7aba60f9160e8c1

  • SHA256

    dd146c6974147236c3c1499530ca42d7c8db391d24fad859d6d7c4d894924e57

  • SHA512

    9fbf24edd5084f3cca4270beccb4d28d8ce3a07c4ba37448aad36be69a3f8f6d64eefdc20873e25c1a931f0e91bcc4ae9e247bc02857cc21a441d1a15e82b114

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gksw:1nK6a+qdOOtEvwDpjw

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_8d9a8335fc389b0b7093db2ba2f32609_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections