General

  • Target

    2024-03-07_9bf31d4fa82bf08530f140f275050222_cryptolocker

  • Size

    117KB

  • MD5

    9bf31d4fa82bf08530f140f275050222

  • SHA1

    ed54a9d281219f3dfaa0e4d1c1ad77a9359a3365

  • SHA256

    477f29ca83d663b7ce7b0aaa76379d5e62f69e44f9388281ed5cc5cf0e1e9d4d

  • SHA512

    633b88b9fb07421883a80d0d0037d1e5b191cdb500fe322e9b8368d9654a19aff892183b383d01e6b956cf4670abf4c4fe87f978324a54658421dec0bb3fbbcb

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjCGYQbN/PKwNgerar/+l:T6a+rdOOtEvwDpjLzH

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-07_9bf31d4fa82bf08530f140f275050222_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections