General

  • Target

    2024-03-09_9b36d7f84ca0afbd17a3414cb0e27fc4_cryptolocker

  • Size

    106KB

  • MD5

    9b36d7f84ca0afbd17a3414cb0e27fc4

  • SHA1

    5e7d8ad5f6aa650fee9ab7df0f1ee6508985e6bb

  • SHA256

    48234b53b8e83fa5c838de26a07d093fe544a8c47068960d06a901b6d933aad4

  • SHA512

    9b8bb51fcede53ad3cd1269a51a743b85c16b6145660245ac10bc720296a180f85d40695cb9a727470971e2fb0915401524efca0da8dd0afc416ecec4e428977

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksT:1nK6a+qdOOtEvwDpjT

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-09_9b36d7f84ca0afbd17a3414cb0e27fc4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections