General

  • Target

    2024-03-12_fc167d398a237ea83374df458a5f0fff_cryptolocker

  • Size

    106KB

  • MD5

    fc167d398a237ea83374df458a5f0fff

  • SHA1

    856955324eba3a0ec3462a7cfe9237c2b34d5780

  • SHA256

    75c7a2c9032556113f3187bf9c463a05c95f66701c585c65e0e90ff1dc534ea3

  • SHA512

    5ab248f71618c8593b39f43cf3c799c63fc2fa443c5fbae9be0403cfec3b7de0ca0770214d7ed49d6a52ddf63f6590742d1f7c0a70a04fb062b03264781b4786

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6GksaM:1nK6a+qdOOtEvwDpjV

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-12_fc167d398a237ea83374df458a5f0fff_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections