General

  • Target

    2024-04-21_9c9f08e248d82b3b71e175e17ce3fa50_cryptolocker

  • Size

    99KB

  • MD5

    9c9f08e248d82b3b71e175e17ce3fa50

  • SHA1

    25810cad88e1af38d1cf3d2cf99a76467bfe3a0c

  • SHA256

    1aa36a0cb072b33481245e2e78d06f41107d4f9f320fa1935830d28c5ede674c

  • SHA512

    5cad8f826d92cfbb354252c8f5a35746427acf51f1acca17b5c3a117e07f79d87d04d2eb46171513f8f8eb27c904b0ff8c4191392127b74602fdf2214638a3a0

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/BKiXgn:z6a+CdOOtEvwDpjc8n

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-21_9c9f08e248d82b3b71e175e17ce3fa50_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections