General

  • Target

    2024-01-18_fe11901e8e210e5a707a382e3299ecb5_cryptolocker

  • Size

    96KB

  • MD5

    fe11901e8e210e5a707a382e3299ecb5

  • SHA1

    992d60d985d1a64687916f6c80234c4ebfec41aa

  • SHA256

    2f1bd5c54111ebf6aa244cc348ba82c61430044682d4ba9cec5be8b3977337d3

  • SHA512

    746bdba0cd03f4d4adfbd9e0136084642758d3ddca59bebffedd76ea76a860e3bac688718c6618a09ec0ea3dd6553e0d4872b381c039d05059fdb5e0032e2928

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbbr/Bs:z6a+CdOOtEvwDpjcK

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-18_fe11901e8e210e5a707a382e3299ecb5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections