General

  • Target

    2024-04-24_00e6c0e51a669d138d9231bd03840d83_cryptolocker

  • Size

    71KB

  • MD5

    00e6c0e51a669d138d9231bd03840d83

  • SHA1

    bceb658c9980734b9502283a9fc12a51f1c402fe

  • SHA256

    36228f34a53a9a84d42d611fd4132eb99b3b0166d8ac824ce64de9adb807a1ab

  • SHA512

    95e48f6ac72fad730fb58e3f7ea45489a60ea4730bf33ac49151c9d63aa3d4c390c99731c9ca0217120591736a05afe00fc9263d5bce87d41da42b760f0fc463

  • SSDEEP

    1536:nj+4zs2cPVhlMOtEvwDpj4H8u8rZVTs9q:C4Q2c94OtEvwDpj4H8z/

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_00e6c0e51a669d138d9231bd03840d83_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections