General

  • Target

    2024-04-27_b9891ef29445f5be0b7977deccaa96b9_cryptolocker

  • Size

    77KB

  • MD5

    b9891ef29445f5be0b7977deccaa96b9

  • SHA1

    7256730f93cc1529e797b08e68ac6197fd46a61a

  • SHA256

    cc7f44f415facacf3aca3e457e655977f86339987a9c0ba9b19570a89f2dc1fc

  • SHA512

    860bac8e379b09ab9ee86a5bdd7917696e1863267b5f521ec0a3771ebf2651b2f3a1e64b351fd52074098ab18df5bd1fd995b91eb89b644b5ab27d57441ac3bb

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJcRa:T6a+rdOOtEvwDpjNtT

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-27_b9891ef29445f5be0b7977deccaa96b9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections