General

  • Target

    2024-04-27_8f9934ce5cb78209b4c3986a5f6703af_cryptolocker

  • Size

    80KB

  • MD5

    8f9934ce5cb78209b4c3986a5f6703af

  • SHA1

    f333674f8b0538b6a657120b0b28aaee3ca59876

  • SHA256

    a2c5c00c8cc0e861fbee028c97a4860771cfb89e67794d84a01135738b093d83

  • SHA512

    8ca99e12fff819f813d91ebf33cfb238471c164b60cd75ec59d10430003fc72aa09530cf67c1c52c7560e2db3696eef20e4b1b939bba8e98764aec97d963f2f1

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1ky7Qf:zCsanOtEvwDpjb

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-27_8f9934ce5cb78209b4c3986a5f6703af_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections