General

  • Target

    2024-02-20_b9a7a74d9cebffb55f6c572e40cbeaed_cryptolocker

  • Size

    82KB

  • MD5

    b9a7a74d9cebffb55f6c572e40cbeaed

  • SHA1

    08b08035096746221dc63bdff062d3bfe97191f1

  • SHA256

    a17ac6349f1665284a12c1db38847ec8dab3ecc4b62813cd68b242f150ed86f5

  • SHA512

    1809d19911c88c8db890432c97b4fbbab9ef3b7fe8355f6614baf0308182d134bae038a483ec14b16b120260788ebc88e2062fdeb9e76a6762c8fdac7b79f8d7

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1Zu:zCsanOtEvwDpjS

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_b9a7a74d9cebffb55f6c572e40cbeaed_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections