General

  • Target

    2024-03-25_b36f738007c0622fed3ce84a104c313c_cryptolocker

  • Size

    83KB

  • MD5

    b36f738007c0622fed3ce84a104c313c

  • SHA1

    9b123f5342cb5ade72115cdc44672b850b181ae2

  • SHA256

    d69edbed1230e21309fac6d3d0f27b8b25201da7a406ee3021dcb78c04f158e6

  • SHA512

    7a0dc4ded2a577424fffd084ff65c84941f8eda7883d1ef9c75e54a8debb0eb97258d9fd0feb6d33fb1501bab8c8cf900402a66840506e7e3e1d76da3c24f526

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd0+:T6a+rdOOtEvwDpjNtd

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-25_b36f738007c0622fed3ce84a104c313c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections