General

  • Target

    2024-05-09_36e6b8809e7f8836fed208a4461a43d3_cryptolocker

  • Size

    97KB

  • MD5

    36e6b8809e7f8836fed208a4461a43d3

  • SHA1

    81c0087440791476de4aed2b4c7c5cfd73534d14

  • SHA256

    8e2d91e7984cc0b727213d41b157561ca09a0aa74964e68b988900fd3121c0bb

  • SHA512

    b2aad92ef15816c63e3623debc3e1ee66b682c4f23d0811d8080fc0a22c31396f2e5bc0af3225033a4b4305f7f3942fb87acca3d9dfc5386d7c4c843c5a2ed18

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/byw:zCsanOtEvwDpjBr

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-09_36e6b8809e7f8836fed208a4461a43d3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections