General

  • Target

    2024-02-29_9f57e17a3f3a4db1ddbc98340b7d44e2_cryptolocker

  • Size

    65KB

  • MD5

    9f57e17a3f3a4db1ddbc98340b7d44e2

  • SHA1

    75970b6625baa83d2ebfe09668e1e6cd76e1883b

  • SHA256

    c0b619ef28823671f86be4ef7c9781369f65ec77225099a0b28224d11547f08f

  • SHA512

    a397acf76a361ab18bea2bdf1a171f8494051ecebb677da4e60d9d5e67e46838955f25c8e63fd0f3965341d0c9ba887b224810610ca2be2d2448cfdd2bf704ab

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUa1Fs:T6a+rdOOtEvwDpjNM

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-29_9f57e17a3f3a4db1ddbc98340b7d44e2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections