General

  • Target

    2024-02-19_b9ce063957465956747a810ba261e831_cryptolocker

  • Size

    93KB

  • MD5

    b9ce063957465956747a810ba261e831

  • SHA1

    99db2d3fd4a9ae86628465a5e898edfda05636bc

  • SHA256

    db700487752d8d7f7ba6fd2ca5938bfbcffc9bd32ab536e353b5a95e886cda3d

  • SHA512

    21cf2d3e0a67936d2a5de4d42c3b98d38ff7aeaa7a9a39ec347bc2964662d00b276641ce56fdec0fb0f07386c087eba030a7b38127a3e9b373a4c5f0acda844d

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/8:zCsanOtEvwDpjB8

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_b9ce063957465956747a810ba261e831_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections