General

  • Target

    2024-06-13_36ce11e8f14018263ebd9ce64a0a7031_cryptolocker

  • Size

    33KB

  • MD5

    36ce11e8f14018263ebd9ce64a0a7031

  • SHA1

    ee3d553fca39f3477ced977ac85427ff99f8f618

  • SHA256

    b8882e312fe97b41d6fe3abe688edc78d9a636c090275c295ceb2256a91cbb9a

  • SHA512

    01e2008727be7a3f723f1bf28bd11e530d8b26ed673fbbee25a9415756d9ea0ca2a70873aa7dd1a648ec6e8e91b8c97cb8d7d9e93b06e5d3a3d5d2107976b09e

  • SSDEEP

    768:bROjawZEjbhxnbcuyD7U9kXfn62tH/1/LpP+R:bRO2wZEjbnouy8Gv6iH/NLps

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-13_36ce11e8f14018263ebd9ce64a0a7031_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections