General

  • Target

    2024-02-01_fe6a5e0f8b6d415e750f648cdf8ca462_cryptolocker

  • Size

    61KB

  • MD5

    fe6a5e0f8b6d415e750f648cdf8ca462

  • SHA1

    e4c1beab43e1a03caa9562f003ad10cc0b95168a

  • SHA256

    e4e0a75a617ae0cbe73b04e68e63235ec47c4fcdef470d5c15e2c2f6e76dd229

  • SHA512

    21f826e1a4d5993799595e2f7b7442820afc018f2f18bd85f4523490103a38ff1e5d06bf161b04dbe08bda129755d31a97024d1799e83951b2971f960f4fd57b

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mnVf:zj+soPSMOtEvwDpj4kpmeLmn1

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-01_fe6a5e0f8b6d415e750f648cdf8ca462_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections