General

  • Target

    2024-05-10_f9b4bedd575bac840a03123d71d82a6d_cryptolocker

  • Size

    96KB

  • MD5

    f9b4bedd575bac840a03123d71d82a6d

  • SHA1

    1e7ec499529e684cd0dc0d3becc9f2f63a791a37

  • SHA256

    5ebcc90dc2da06295854fe7c1f8dfb4a8f815187d446e44c746ef4da274cfb49

  • SHA512

    f9d5efa46f4164f571814b3ce550c5aea94c6cec4909aa932c8deb7d6925173451452111a40296c7a8251556ebc71c9fed6c1862319ceea1d6d8fab5418a8623

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bqq:zCsanOtEvwDpjBb

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_f9b4bedd575bac840a03123d71d82a6d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections