General

  • Target

    2024-03-19_c9049c5d08b7833e99c45a2927371e0e_cryptolocker

  • Size

    56KB

  • MD5

    c9049c5d08b7833e99c45a2927371e0e

  • SHA1

    55a1b8fbec7b4dacf6dc5c274b1e8e974d78c774

  • SHA256

    dcb77d874ecbd6da54138d385f8f9b9d2c1984374913c5b9ecf4ed680d85f2e7

  • SHA512

    ed1955eaccfa2964ed75352398f41e99cc4128fc300007e3a8998212568802e651a1ff72ac165a9f10c031c80a2d89e81b3351b4194238bb792aef071780b8d0

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpyn:zj+soPSMOtEvwDpj4yO

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-19_c9049c5d08b7833e99c45a2927371e0e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections