General

  • Target

    2024-04-25_c9a492b211f12bee6783564e20e54720_cryptolocker

  • Size

    94KB

  • MD5

    c9a492b211f12bee6783564e20e54720

  • SHA1

    b78982bc25d1b85c9f199506826d7ea8c78acd7a

  • SHA256

    9eae5ecaec2a5d7725ac4ae9fe2cc14fdf8b076c39ca7a7cd61076a3b301465b

  • SHA512

    619cb87f693ae4c17703732a9a0fd819ad6aebfa4848206400b9b96daa5844fe716f953390117d02fa53d0f0b7a6fcca7559b8726e8f4cfcd9b9b4c53960f0d1

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/O8:zCsanOtEvwDpjBx

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-25_c9a492b211f12bee6783564e20e54720_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections