General

  • Target

    2024-04-11_1b9960c12fbbe05451ed1bea323cd91f_cryptolocker

  • Size

    85KB

  • MD5

    1b9960c12fbbe05451ed1bea323cd91f

  • SHA1

    e9b2cb9fb0774b8223b62f14099071615018bdc0

  • SHA256

    eb4fac54ad43ce83de869a6ad9229f2f9f74949f0cd2bb4c77c8b2bc63df2f2f

  • SHA512

    8f66ae2c7400a62a83a256803e68e631b1c7a543c75cd0fd86f07f4c532b8d9035f0add340a17b17940c32ef837b1cff1c746ccbba80a5e702d6af784193d3d6

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kyJS1/3r:zCsanOtEvwDpjZ

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-11_1b9960c12fbbe05451ed1bea323cd91f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections