General

  • Target

    2024-04-10_fcbf3bf3b65451142e630ad64e440ff0_cryptolocker

  • Size

    51KB

  • MD5

    fcbf3bf3b65451142e630ad64e440ff0

  • SHA1

    8e750c2eeee0c6aede38692b21ee42c6a85153c0

  • SHA256

    497fc189b0cd09a92351998a4fc8c48fc57f25e04eb222e737ec709a77b2852b

  • SHA512

    8a477e5d4252570abce2e5d8f662b0d35ca5bbc601e2262eb5ad23d4461034a0b003e862c9e42e893d8f80a538c935773533c423d55f70e5492977a6a053e0af

  • SSDEEP

    1536:nP+4zs2cPszL3MOtEvwDpj4Hy7B3g9CWuAxWLQHz:m4Q2ckzIOtEvwDpj4HYs

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-10_fcbf3bf3b65451142e630ad64e440ff0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections