General

  • Target

    2024-02-17_9a57deaa2af09c0558b4e58c556c8761_cryptolocker

  • Size

    117KB

  • MD5

    9a57deaa2af09c0558b4e58c556c8761

  • SHA1

    1c4b75d0950fc46923ae296748a3165dbba46fb4

  • SHA256

    d55d45c56e1b6a52f6c4114a809dd59fddc32cf56ca906ae8dd7d2a5fec196a3

  • SHA512

    09339ea2937708b508155033434a9762104616fc6b927be4016485699033007f21afb9b42bf72a74bec04f39a2524c0930c9903674e72fb380fa34d8671828ec

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01kQo:z6a+CdOOtEvwDpjczs

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_9a57deaa2af09c0558b4e58c556c8761_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections