General

  • Target

    2024-02-14_9b95fbdbbeb8e180a06dc47c3d7f1330_cryptolocker

  • Size

    109KB

  • MD5

    9b95fbdbbeb8e180a06dc47c3d7f1330

  • SHA1

    c9958386441c42ab9eb5e4b312d73ab9eff35fc6

  • SHA256

    df509d4c4172f7d280a43646847873bf67cf9e65fc21f5d7e61fc143a599e609

  • SHA512

    0beb0e1eff5e3f8f3a02f715cce3805a16f53cf32d7c23ae4395c8ee6c841abf2735875d830b8197e0654abe043334b5bf0eafef1b2bdad4d54f289a1fe4f387

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwMg6C:z6a+CdOOtEvwDpjczV

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_9b95fbdbbeb8e180a06dc47c3d7f1330_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections