General

  • Target

    2024-03-19_8e07e14a3399646b2a38eaa818896dd9_cryptolocker

  • Size

    118KB

  • MD5

    8e07e14a3399646b2a38eaa818896dd9

  • SHA1

    9c79f942f203ee7774beebfc74f49ead3fd9b385

  • SHA256

    113ad40ba944ab7b604ee52035e5b5ebb9737fb5163a50892f275eec861990bb

  • SHA512

    9c940b104d0f2dacc89533362ccbe674f204b9284df098f46bdb2103704cd0e75cd7d1709a80603189a54bdbfb8df1f2fc1ec83b0bf30fffde7f0283162f8c11

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01r7:z6a+CdOOtEvwDpjcz9

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-19_8e07e14a3399646b2a38eaa818896dd9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections