General

  • Target

    2024-04-15_e36ff4bd65859f3faa69e9f7c1d61b1d_cryptolocker

  • Size

    37KB

  • MD5

    e36ff4bd65859f3faa69e9f7c1d61b1d

  • SHA1

    e88f76ffdb5a2593c51f8abce36ddbbdeb3b44c4

  • SHA256

    282449ae14f053d8f3e1ffc56668a91759680096cbee698ec6eec853af2da6bf

  • SHA512

    ebcf485f1981cbf74b918e5a9043b99dfe00ef37dd583280faced7e11c1e8a837cfccbc1d81e04fc99bb1d472a6678ea93ec3525c3f6c1bb647e240dba0057a4

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYau:qDdFJy3QMOtEvwDpjjWMl7Tdu

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-15_e36ff4bd65859f3faa69e9f7c1d61b1d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections