General

  • Target

    2024-04-27_b9f3fa4d72161abbb083113179f3af5c_cryptolocker

  • Size

    65KB

  • MD5

    b9f3fa4d72161abbb083113179f3af5c

  • SHA1

    2d006269ae0769ded1259dd7a236d59fa9415133

  • SHA256

    0308cc383b567a9ca7828c77437e688b80584495a5cd94470a404f7814c9aa1f

  • SHA512

    a4f84c1a867bc3061ce5d0e42d040d2814d9a6f8139bb8dda0ddeeb17e1632ea293ce66a0456858579dc466f45dad0a96ed4329d21b7c1b69a9e774997103201

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5k5BPRP:zj+soPSMOtEvwDpj4kpmeLmQ/P5

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-27_b9f3fa4d72161abbb083113179f3af5c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections