General

  • Target

    2024-03-07_9026897b33aa78f7b81e9ccb7ab1d6cb_cryptolocker

  • Size

    65KB

  • MD5

    9026897b33aa78f7b81e9ccb7ab1d6cb

  • SHA1

    1cf3ea5c5b56d0608388263a4fc144a87efb9373

  • SHA256

    a21ffddd6edd8ddc6390dc271394810aec5dc52cbb43172cf298f8b23a1c55f6

  • SHA512

    6afbe24054f6a6117af7d969a1f72f4d99738c90fffc731a622dfdb14cc17b04e90e16bc74f1bbcddcc1441f117607bbc7242c6b1e8de0c30f2408f4d6f36f91

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6UnU3:1nK6a+qdOOtEvwDpjj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-07_9026897b33aa78f7b81e9ccb7ab1d6cb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections