General

  • Target

    2024-02-20_fe60109d50ba518970b7f9b2f3e703c2_cryptolocker

  • Size

    63KB

  • MD5

    fe60109d50ba518970b7f9b2f3e703c2

  • SHA1

    bec316a5ddd082a437cb84682d0857102f1199d1

  • SHA256

    8788b9bfb19402d7c5685fcffa227806f45225a14fe45bc875d5de6a2a02aae6

  • SHA512

    9afe8c59dc740db1f07c87415e0975fa7ff154f95b702d5ced5352422c0fc3aa91ccc3dad8d7e1c801b6947e0bb5e5706810372a6ae3ce8b1a76ecd3c0814dd2

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoR:1nK6a+qdOOtEvwDpjP

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_fe60109d50ba518970b7f9b2f3e703c2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections