General

  • Target

    2024-03-07_fee0b693456d3dc5ea55740ea4d74adc_cryptolocker

  • Size

    77KB

  • MD5

    fee0b693456d3dc5ea55740ea4d74adc

  • SHA1

    7ab17a335410eed1d10a1152334fdc84a0a3aa96

  • SHA256

    06ad0a172c09e86c74cd582d3ab50a2179d53875a2ddf196ea0a8158302096a6

  • SHA512

    e5b9b6290e67daa0bb5962bfe25b383d162aad91d488324c25a1019e84e1cefc1deb98c18c579b8c5484d9ae6f6acf8413eff0975dee800f33a5716ab016c217

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJ0tq1kych:zCsanOtEvwDpjf

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-07_fee0b693456d3dc5ea55740ea4d74adc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections