General

  • Target

    2024-02-22_ab9d544cf36f558c2e94019012c32a8c_cryptolocker

  • Size

    67KB

  • MD5

    ab9d544cf36f558c2e94019012c32a8c

  • SHA1

    b33386077a9d770fcb1fa968cca25b2441d71ce4

  • SHA256

    1159eb7e9a1ad97934b8e15565ff203fab7063dfdb50b176e04b337642bfcfe4

  • SHA512

    d9ea59ea8b040f2df39c3d23f50f1db607a987a50470be625d15709c423b7e4ff6a0cad6ec543ea1b5d88294af3cc54eb31568dda7b643c1b8491f5fdb8fde9e

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBh:z6a+CdOOtEvwDpjQz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_ab9d544cf36f558c2e94019012c32a8c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections