General

  • Target

    2024-04-11_fca3b0d56fe86f4d6ac1aaabb2aa6517_cryptolocker

  • Size

    66KB

  • MD5

    fca3b0d56fe86f4d6ac1aaabb2aa6517

  • SHA1

    b5abc65ab75817129b31fee10edd9bcebb8487c3

  • SHA256

    404abc6b9f0b3eb88013389164ad0fd232913736ed4f16847983704e00b70643

  • SHA512

    5bd0d3f58cdc3e3fb6d29384d31f69a8d1ca58083cd4d8b789f2b978d84be331c8972bc6dd20eaba86b4a9a50f0109760bb49f44061278c123e6fe426e164e76

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAoQRhF:1nK6a+qdOOtEvwDpj6

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-11_fca3b0d56fe86f4d6ac1aaabb2aa6517_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections