General

  • Target

    2024-02-28_9fb3fcd1ea00c0a0287b18245bb318f3_cryptolocker

  • Size

    78KB

  • MD5

    9fb3fcd1ea00c0a0287b18245bb318f3

  • SHA1

    bce0c6a6cc11bcb2ef0f1ae137f6e67cc7217d69

  • SHA256

    d27f0cb5e9b13a435d70d3dca634938c7fd314ecebe9ceb4232dfb0502878293

  • SHA512

    d4bed1f57564d3c686d242aa0e4bc8c9270587de0ba0c1e6363de1887c9e49840e8c960a472b20743f2a3aea59000cc6d6af48372dab1125cbb0b4904d20c616

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kya5:zCsanOtEvwDpjX

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_9fb3fcd1ea00c0a0287b18245bb318f3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections