General

  • Target

    2024-03-14_9ec14a1d87d223f890752cafbb2dcf04_cryptolocker

  • Size

    64KB

  • MD5

    9ec14a1d87d223f890752cafbb2dcf04

  • SHA1

    90352befabdb53fad53371d71abad5064281a656

  • SHA256

    76b4700230ece499b2683b03b0462773f3ed7b4d2b4e80074564893c87eca359

  • SHA512

    4efb3f9df6d977e4679557b8a594e13156fe9be6b31e3043ccf4233da6e4fb65cade35add223426ff564e9347466ff8a4375f8a2745e63ba5280b9b4f97daf83

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5K7R:zj+soPSMOtEvwDpj4kpmeLmi

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-14_9ec14a1d87d223f890752cafbb2dcf04_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections