General

  • Target

    2024-02-17_9ef6f40986ce62444ec83eaf8e168ed2_cryptolocker

  • Size

    117KB

  • MD5

    9ef6f40986ce62444ec83eaf8e168ed2

  • SHA1

    55397e62f5418d9cba38beab5f3e98d70898cac3

  • SHA256

    b1ab298dd86447005a88840950d4af99099ba9badeaa54f7604f961a2b9bac07

  • SHA512

    b12eb8db710469974d17897bf5bc174c19a6f871fd9f4d8904af694a0069377193f86056fea96c1f444d2a8ddddd3376488f213966ebb88394ba5860159a7cdd

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01I:z6a+CdOOtEvwDpjczm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_9ef6f40986ce62444ec83eaf8e168ed2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections