General

  • Target

    2024-03-09_aa6e7bde9d9ce2c6605f204622f0384e_cryptolocker

  • Size

    98KB

  • MD5

    aa6e7bde9d9ce2c6605f204622f0384e

  • SHA1

    879e1c7ed4ef610f06621fc1c6495afc979a3fce

  • SHA256

    d70b29e66fb7f7489a16bc2f7ad102e0aadeaf071130cbd66fe46b52d7667bf7

  • SHA512

    e9692c14d3dac2edaca26ae879d7e7935a43e38b1abc63e49d0a014f816ce126f2daabe3647ac9d911ff7888ff2bff74049a2e491ccbde96711581305007254d

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjuvQpdi:zCsanOtEvwDpjd

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-09_aa6e7bde9d9ce2c6605f204622f0384e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections