General

  • Target

    2024-02-23_09f6d8eb01e97003e79472fb4093a494_cryptolocker

  • Size

    98KB

  • MD5

    09f6d8eb01e97003e79472fb4093a494

  • SHA1

    363d048e6404862e899ddf7513801334f418f1b8

  • SHA256

    739e9f9d1f52a199682feb937b01d5a30797dc3e6db441d3ab508bead1d96784

  • SHA512

    60ce97a4fd4b8740dc711935d3baf679de1573545b25296374d402e57600c5692bdf2964305ed348843cce59a0cf0d7b2a2f71fee22b28c36633b4c95a2e6297

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/BKiXC:z6a+CdOOtEvwDpjc+

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_09f6d8eb01e97003e79472fb4093a494_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections