General

  • Target

    2024-04-19_2a9ba88e12a09f20db3b7e814798cd30_cryptolocker

  • Size

    96KB

  • MD5

    2a9ba88e12a09f20db3b7e814798cd30

  • SHA1

    55b26d3613cc1665c69e9e15bb04d28f8621fc3f

  • SHA256

    12358b1a6759b4e8e9448b2d9b4ad2d2c81860582b0159f0866ba4784af45f67

  • SHA512

    4546cdb820e5e74b8622681813e3fc6b8054ef0e0d2959cff3bd7556ae00d07a7b34a2f785a471d73d7046fcbc695684ec591e97775bb288a263dbf0efdde4be

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bq2:zCsanOtEvwDpjBP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-19_2a9ba88e12a09f20db3b7e814798cd30_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections