General

  • Target

    2024-02-18_0ab9cb9aa3ea6e7e633b1288b89d805d_cryptolocker

  • Size

    97KB

  • MD5

    0ab9cb9aa3ea6e7e633b1288b89d805d

  • SHA1

    e342056f61d8c90a0593ab6990597feef9c11288

  • SHA256

    08103e9f56f58872b69f3716c26b68fbee6325f3ea2b4c39ee95fe3684c5b5d8

  • SHA512

    21ce8edba77f5cda533bcfacbd2e308e47c1b4a63e910fdf6170dd188f33776787c90124bece221da0a638b3061e6742893346941d68b27b8716e0844a08664a

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/BKdq:z6a+CdOOtEvwDpjcx

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_0ab9cb9aa3ea6e7e633b1288b89d805d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections