General

  • Target

    2024-03-11_fa56a93ebc8dbd4579abcf18f9540508_cryptolocker

  • Size

    118KB

  • MD5

    fa56a93ebc8dbd4579abcf18f9540508

  • SHA1

    5d5e3b7731afd3f3cb5779a6185040df599e90b6

  • SHA256

    a52f44b290a1c9bb677fdc3d0481b73e90b35b4f3104bb8fe42941e35fc5278e

  • SHA512

    1d87225fb051717735aedb917cf63d80485504178fb2d4502c3371fa0578c2d31f421e1acb71c72a04a5cd8f3e5d80eeb3cf277770037bf0efa19dbd10dfc404

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj3GYQbN/PKwNgp01t:z6a+CdOOtEvwDpjcz/

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-11_fa56a93ebc8dbd4579abcf18f9540508_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections