General

  • Target

    2024-04-21_9cd09784354d69f47e9fa43f4b71335d_cryptolocker

  • Size

    96KB

  • MD5

    9cd09784354d69f47e9fa43f4b71335d

  • SHA1

    222c81381e2ba2940e930ad6a3354f90c4ee99e1

  • SHA256

    f95c86e075691306cc73e915ba5105be0c29bc6863bf2a4f154d74682ea567cd

  • SHA512

    a3b20fd467287ef498a398cfa708da294fc5407ea9b75fa7d78cfa67ca1816a7cfe4e7ca27c7f243b28f7af565b7962147cb675bb24b0034011fe9894c258cd0

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bn:zCsanOtEvwDpjBj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-21_9cd09784354d69f47e9fa43f4b71335d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections