General

  • Target

    2024-02-14_9101f8f9c8661a23e0f0a68d8839ad2a_cryptolocker

  • Size

    81KB

  • MD5

    9101f8f9c8661a23e0f0a68d8839ad2a

  • SHA1

    3b57f9759b933b4ba6d1fe283809dca5d50b2c36

  • SHA256

    4700f07f92c1a10b1f038483ba6ed8f405fc98303354386ce881c3f786268842

  • SHA512

    fd3403e08a36cc5330b838d4652f5779fec206d65d5da31ce3cefc954cc907256584afbafa870727e8c901a3c748a3ce94fa707874e423e0ff66921184f55c18

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd0m:T6a+rdOOtEvwDpjNtl

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_9101f8f9c8661a23e0f0a68d8839ad2a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections