General

  • Target

    2024-04-17_36b9bda8c561d3033b8cfaf7aa69694b_cryptolocker

  • Size

    108KB

  • MD5

    36b9bda8c561d3033b8cfaf7aa69694b

  • SHA1

    e039533869d68c1c7edad36e0044d6598065fbdc

  • SHA256

    2bdc0de461fc41c81dea535c015c2552123d2124676541f5028599152b5c89f1

  • SHA512

    7448f469f68df4f826cff225a44bceea735b1a92ba09fdd8fd26b7927bbfe6d3ad98b1dc3653e520b26a3e7363b7286aeeb6d0bf1057d64913ba004f6cb343cb

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gkszfl:1nK6a+qdOOtEvwDpjR

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_36b9bda8c561d3033b8cfaf7aa69694b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections