General

  • Target

    2024-04-08_f9cb5c13c8cb3032db9d1b5e026e6bbf_cryptolocker

  • Size

    59KB

  • MD5

    f9cb5c13c8cb3032db9d1b5e026e6bbf

  • SHA1

    2dfb11901646ee14a9dd5dbf61c519f69342377f

  • SHA256

    462af55d7e26e379a159b91d3cfb008e1a91644f6f9c25bfa0c999aa207e6f9c

  • SHA512

    266e3449db4024f40a58b91d8dbc3c43194384c599cd2dcbc0f1a688fec44acd4dbca2035d937c2a3af3ea321d2dab7f1ba56d81f1e187d03c2ffee3b17ca184

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFeV0ZOfcpysnymu:zj+soPSMOtEvwDpj4yRymu

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-08_f9cb5c13c8cb3032db9d1b5e026e6bbf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections