General

  • Target

    2024-02-17_9920aa368a3d027067e1a9099cec2639_cryptolocker

  • Size

    55KB

  • MD5

    9920aa368a3d027067e1a9099cec2639

  • SHA1

    70c63740cd417808ff090c51eeab9bd5dedd580b

  • SHA256

    db659805d821522154f18bf09a341eedc0ab9f53d3b07dcfcee8b2371611fb52

  • SHA512

    26139fe5ad595b674fa46cafd27aa2d2d64d8ea65dd02c2720d2bd79fb777b2d5e8bd90e52e6f01d985fcb8fc940e47289181f4a6b72154c06199d972f9989e1

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YMLam5axc0:z6QFElP6n+gKmddpMOtEvwDpj9aYah

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_9920aa368a3d027067e1a9099cec2639_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections