General

  • Target

    2024-05-02_360539e3b1a82e691e3b803c02a0156f_cryptolocker

  • Size

    96KB

  • MD5

    360539e3b1a82e691e3b803c02a0156f

  • SHA1

    21d9f323717eb14d0414db65d3d6c4f80a2cfc9e

  • SHA256

    a63f54128b5497bce9baa673cd65c7a851e385406efaf3088a2b0833c8c83773

  • SHA512

    3775ecd35a218d0c0af0bf142f9741943132fe8ab395ab542338c5a7db0dd02e89e69a5443a955741fe3a0b87e070584b03e2b57f595458aa8e666a1270154db

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/bqg:zCsanOtEvwDpjB9

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-02_360539e3b1a82e691e3b803c02a0156f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections