General

  • Target

    2024-04-04_a9bdcc4ebc02c0d22b17fdf829d62f7f_cryptolocker

  • Size

    84KB

  • MD5

    a9bdcc4ebc02c0d22b17fdf829d62f7f

  • SHA1

    129591f795fabed0710a8c2d03f6d9c4e8e30c02

  • SHA256

    b877753023d61bff2ba1ed010bc91d655e14316dffb234cc57168d38bf7485a1

  • SHA512

    38f181a2a9eeac5d4f90fb21fb2d0ffcd591c8df4264f1f879a87bb4920ea26db6e44f16702d99cf09f05390f8aa707ef3e7ac6a5c92b5ec647332b1c35076c5

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOT7vM54:T6a+rdOOtEvwDpjNz

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-04_a9bdcc4ebc02c0d22b17fdf829d62f7f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections