General

  • Target

    2024-03-14_7969c9ee19465442b48701dab6c7a2bd_cryptolocker

  • Size

    99KB

  • MD5

    7969c9ee19465442b48701dab6c7a2bd

  • SHA1

    5fdf0349ded84a63c78025ea2e788f3ec8bac8ae

  • SHA256

    333e89fa8b8f3b2fa0f8afe4a9444908d17557b5fa05bdd4d47442478793655f

  • SHA512

    6ceb4f7f90e39f20eb2063e5fd98a811f86f62395a795bd49e0e90b52058bd98c5f88119ba4b33f65e5f4b74a6dd6379e041230146167052ef448c7c87f0d967

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/BKiXa6cLL:z6a+CdOOtEvwDpjca

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-14_7969c9ee19465442b48701dab6c7a2bd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections