General

  • Target

    2024-04-24_9b592e6bdf6b45e66f880c553263079c_cryptolocker

  • Size

    96KB

  • MD5

    9b592e6bdf6b45e66f880c553263079c

  • SHA1

    69a15bd5b0a7a373d9e35d166e342da617141e93

  • SHA256

    e279f17c02844414657c1146256ad8b3c725bbf36615860a34e73fdaf22ccaa9

  • SHA512

    93a07fae3de4cb3434208ff5e315eba3c6dcfcd2a23d402c5a0670f9a5dca1e52cc5824859e96cb7e049683f0e678c37ebffbc39a091bdcd6a80b48a12db8c0c

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bL:zCsanOtEvwDpjB/

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_9b592e6bdf6b45e66f880c553263079c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections