General

  • Target

    2024-04-17_fc028262d2c67c32a7bc8f68aee5f5bc_cryptolocker

  • Size

    72KB

  • MD5

    fc028262d2c67c32a7bc8f68aee5f5bc

  • SHA1

    95b92b73a0407267a78c9e3466746ac96c6ad623

  • SHA256

    bdf5fc63c9eb11505b9d17763c85e57908d493d562e1613ec113ef15dd78c8f6

  • SHA512

    383a39b8fbaa7dba10148bce7f93cdf4dc01c79b0c5525492b26b115dd7f00475d9b529da26d4e31fad97a2a57590886748b122cbc20c8e7a2b449068f5c9146

  • SSDEEP

    1536:z6QFElP6n+gKmddpMOtEvwDpj9aYaFAeBt:z6a+CdOOtEvwDpjQf

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_fc028262d2c67c32a7bc8f68aee5f5bc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections