General

  • Target

    2024-03-15_36ee3ca69b95ceb57f35fa602ae8b2de_cryptolocker

  • Size

    75KB

  • MD5

    36ee3ca69b95ceb57f35fa602ae8b2de

  • SHA1

    d92c6ff286179c921856574fc7cb3eaa1afa81ea

  • SHA256

    c72742c1b9549fefec72a6f782685d8b6e47b252737b09ae0342303694aaaddd

  • SHA512

    d12ebf0a091935bc740c643dfa01a0572687a02cf3b28fb48f48035232082a8ff2292d36753c39f1e788a7b94d726404a60524ecbf4a33682bb1691f13c18306

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJcRd:T6a+rdOOtEvwDpjNto

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-15_36ee3ca69b95ceb57f35fa602ae8b2de_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections