General

  • Target

    2024-03-14_fa19f490c902119533fa670317df5659_cryptolocker

  • Size

    108KB

  • MD5

    fa19f490c902119533fa670317df5659

  • SHA1

    d8699939e939129a1dd91a19e0ef5ee58c770791

  • SHA256

    78936f772ebd2f3952d009510c2d6e3daa178048e2273fb1728bb064a1d029dc

  • SHA512

    1a941fc349aaf04201aaceed703b1df7e485c4a374d1d6648d56d86cae05693e8bc6ddbba251052497e45e8bfda4ce22c29203c9f44265c1d2e406cf159517d6

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsalRn5iF1j6Gkszfj:1nK6a+qdOOtEvwDpjH

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-14_fa19f490c902119533fa670317df5659_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections