General

  • Target

    2024-04-17_236b4f84f3637a8b4928e3a151ec21e7_cryptolocker

  • Size

    88KB

  • MD5

    236b4f84f3637a8b4928e3a151ec21e7

  • SHA1

    c53f76aa660933b84f5f8dfdf291f18dd8524b63

  • SHA256

    6f06228223faf9dd8f8aa3f48be5dad9de9bc3f36abef414a39f5482088149a0

  • SHA512

    9b5eab2f81f61a80685727931b0cf10f8c34914c81afc0fc89a9c6280f03e140d7a4894644aaad1e5fa4f2a6b3352560f376c6a1d959a4d480157a9d231b8e03

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAF:n6a+1SEOtEvwDpjYYvQd2PF

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_236b4f84f3637a8b4928e3a151ec21e7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections