General

  • Target

    2024-02-11_36b7abae2964cca3c84f7ba0a540dbfb_cryptolocker

  • Size

    61KB

  • MD5

    36b7abae2964cca3c84f7ba0a540dbfb

  • SHA1

    d73c8a969a5f3d998bacd4b8db37a8c87a618a79

  • SHA256

    7d7774ce7f3acd1ac3df1a52af5e9a3ecdd65ac315715dd9e142f3ec219e98e1

  • SHA512

    aa501deb5c5e530d324d0ead6138861c8738d74eed1b44b0d22ac23e106f5d55bd0916241a734d81affb00c6e8e9e0cb8a199d8f1f30b01d2eabe87649596d46

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVO:zj+soPSMOtEvwDpj4kpmeLmnI

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-11_36b7abae2964cca3c84f7ba0a540dbfb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections