General

  • Target

    2024-03-19_c9347f80f9d858e4e95f8c264df2daf9_cryptolocker

  • Size

    50KB

  • MD5

    c9347f80f9d858e4e95f8c264df2daf9

  • SHA1

    cab6d83c9bfce45aa439dcb256d0c5034a57616f

  • SHA256

    6ad2050de22365c7ea8a3dd48e3b1a13e17977b65e43f235d8651631caf4aa51

  • SHA512

    20de9ffd33732b46c6f7475fc93fc79fd6a5db10f252149014c87b2d7418560e4a500e0da848e9e9f97a6643f4c89a916ad072aa25459fc0e2f0bd6c31e6902a

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0Z36esZ:zj+soPSMOtEvwDpj4y0eo

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-19_c9347f80f9d858e4e95f8c264df2daf9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections