General

  • Target

    2024-02-13_fa286b238e9ee31d2ffb6b0fecfbd14a_cryptolocker

  • Size

    67KB

  • MD5

    fa286b238e9ee31d2ffb6b0fecfbd14a

  • SHA1

    bc46e038567a1ce602bfc4cd3d4d40823a8335de

  • SHA256

    8160e8ff16b492e7669b2b38df261bb87a4b278b7f55e7bf887d82ad36279166

  • SHA512

    c94b29a46dd00ef59da9b59408fcdc1c0ae6d1d1f556d194929156aee1e2e25bfda7b48e51c6ce4b1abee2d59730657875c2a3131e6f42b00480e4c8d4b1c02f

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBr:z6a+CdOOtEvwDpjQp

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_fa286b238e9ee31d2ffb6b0fecfbd14a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections