General

  • Target

    2024-01-27_fee66ddb005d61d4fd48db8fba1007d1_cryptolocker

  • Size

    73KB

  • MD5

    fee66ddb005d61d4fd48db8fba1007d1

  • SHA1

    ecff5a82193a7dfaa602678c216bf65b4d4986cf

  • SHA256

    de4633b96e95c20e9f4b3200a1a0646f45305417542b1b3802d4cff1898430ef

  • SHA512

    63a750741a78c683b35d0e994c26253d635d48d8e2f608d8e8204a60d14a5a4221ec13c269dfabb5f4825f489ce8eabd9ba1dc5a36e60fbd4a35672718e382ce

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBd/LE:T6a+rdOOtEvwDpjNtS

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-27_fee66ddb005d61d4fd48db8fba1007d1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections