General

  • Target

    2024-02-13_369433803d674c601a4d8f3d8c81bf79_cryptolocker

  • Size

    77KB

  • MD5

    369433803d674c601a4d8f3d8c81bf79

  • SHA1

    61f0bf7f4a1061e6a4b72292f1d77be0294f4314

  • SHA256

    0e51a7ebd24f2118f4c473308de537f055d5065de1b9236be91ecf3e8728f62f

  • SHA512

    481a54c2d3ca0223908ca69bd0c448bac8310a4f9f4226b0d83b57c121990f0a5c54c30d71a024797dd25c31a4e8fdf350fbeeefaafce697f7bca5a5fa8be7d0

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSafiPuH:T6a+rdOOtEvwDpjNcN

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_369433803d674c601a4d8f3d8c81bf79_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections