General

  • Target

    2024-01-28_fced7774ea637d9a1543c14313902ea8_cryptolocker

  • Size

    60KB

  • MD5

    fced7774ea637d9a1543c14313902ea8

  • SHA1

    587bfc37d8eb18c65ef430c7b08e988a199f4819

  • SHA256

    1089e3b9c2481743cc8a078f93cf1cc2b79b4db2766b93cb886779b249214142

  • SHA512

    bce94b702e4d4d921c1cf3a0ed95136d321add0d0ef76ce0d1786b4831d620f62beaf08e6bdc848935301a61795d26cf538ec6dcb972924472088c23064603f8

  • SSDEEP

    768:P8mnjO6LsoEEeegiZPvEhHSG+gxq9um/kLyMro2GtOOtEvwDpjK:P8mnK6QFElP6n+gxqomddpMOtEvwDpj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-28_fced7774ea637d9a1543c14313902ea8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections