General

  • Target

    2024-02-18_8e9cb7fff076eb3013955b7313bf6942_cryptolocker

  • Size

    63KB

  • MD5

    8e9cb7fff076eb3013955b7313bf6942

  • SHA1

    9cb2e88ac5210da506773e7a9a053ed33d94f194

  • SHA256

    ed5a051f98f52483379f36b56ef242cc0e81d5103e2ed569d606ce4078bc0968

  • SHA512

    cd569f8a7af30d42e62b7c97e6dde337bb905f616a2e04cd74dcca5d543e18e91b766bb29369b1329bba6e2ea0437ae51bdd87bda4e958bf7109b31eacf546d1

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5kJ7m:zj+soPSMOtEvwDpj4kpmeLmQlm

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_8e9cb7fff076eb3013955b7313bf6942_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections