General

  • Target

    2024-01-24_0fa1d790c1f390a230b2f62dee72d9bf_cryptolocker

  • Size

    60KB

  • MD5

    0fa1d790c1f390a230b2f62dee72d9bf

  • SHA1

    ff08cabcabe886804475d7ddce003cd60a2e78ac

  • SHA256

    876472e7e88498d47dfeb6322c2f50f892ce256c9fdf36745208032f4e5b2ebb

  • SHA512

    04fbe65a232b2cbf8c14c7f0e43f7354c1af4ee149758eb3815a32ebe86177489c339e474f10d8b66be201f722ef800070d5d260c98153dc205d89607a02b926

  • SSDEEP

    768:T6LsoEEeegiZPvEhHSG+gkum/kLyMro2GtOOtEvwDpjhXMLamkc8J5U:T6QFElP6n+gxmddpMOtEvwDpjwa3U

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-24_0fa1d790c1f390a230b2f62dee72d9bf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections