General

  • Target

    2024-03-15_41e3d3fdb67421a5b6b41a074242c6c6_cryptolocker

  • Size

    118KB

  • MD5

    41e3d3fdb67421a5b6b41a074242c6c6

  • SHA1

    36576c93bc0dda03411f14b07ea4e3d01931f62b

  • SHA256

    580052a5926a3b9c3cd7117381d85cd2943a08b32359d35b20cb25e2ec95a63c

  • SHA512

    9da20a5b8f0333b03a1f44d37ab6c07ea97966e1f11e49a578de07db477a6a6674b15667797105bc599186f57c484735cc648b5a183fd3c57f380d2fc962d9dd

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01rBEr:z6a+CdOOtEvwDpjczO

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-15_41e3d3fdb67421a5b6b41a074242c6c6_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections