General

  • Target

    2024-03-07_37f69ecfab3f4a1eb8a8cc0fffa75622_cryptolocker

  • Size

    59KB

  • MD5

    37f69ecfab3f4a1eb8a8cc0fffa75622

  • SHA1

    243f57bb1c6ace082f8a4572f46232704f526836

  • SHA256

    1b1dd3475b66df0b15c4eaab8343e8c447b5566a08b69756b1777e918c3a15c1

  • SHA512

    b7ddc3614925e9964926a4dacd2f313d9d971c0d34d4a62afdde1b551fe5bae49a9d4d1cf04bd9d870eeedbbdbfd0dc118f1be78b648f83d2351223be1cf482b

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHNMu:1nK6a+qdOOtEvwDpjk

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-07_37f69ecfab3f4a1eb8a8cc0fffa75622_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections