General

  • Target

    2024-02-13_faa3ba70807704c5c00790f669bcc666_cryptolocker

  • Size

    65KB

  • MD5

    faa3ba70807704c5c00790f669bcc666

  • SHA1

    8f8210276826a96af1237c79ab50a74002003e3f

  • SHA256

    7bd0b2ba6775783a276f1d82fc5f5b30645a56e1c771046ff3fa7329fecabbb1

  • SHA512

    338686cf3672a31e69d5a9ebb3ed4fed10794f0b8f6fe544974b6c1146feddb96b41adc2a7f25632498bd63d703f252e3b05f9a7fa7893b269eb4330b8a57078

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjY6Uncm:1nK6a+qdOOtEvwDpj6

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_faa3ba70807704c5c00790f669bcc666_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections