General

  • Target

    2024-03-13_fb31823c380267794e4265da3bbe783f_cryptolocker

  • Size

    66KB

  • MD5

    fb31823c380267794e4265da3bbe783f

  • SHA1

    7376f27184454376778d886033ca5188ced5d778

  • SHA256

    8d52e6371c0104b4c743bdbb956e02e426c7482ca7e3c792dab9eb2142be7b56

  • SHA512

    580207427482f19954753cc5b7cf89ee2ae211486189065c88128f3fb7669cdf2358306d2b1145d14baa2214aaf2c8caabe08ebf1cb65e5be151ce4258471333

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUa1FM:T6a+rdOOtEvwDpjNs

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-13_fb31823c380267794e4265da3bbe783f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections