General

  • Target

    2024-04-19_facecb51a7d0c48014952fb03145b154_cryptolocker

  • Size

    95KB

  • MD5

    facecb51a7d0c48014952fb03145b154

  • SHA1

    814cfd910bb68a10cfc0827625f1eed4b6e101d4

  • SHA256

    89faceb4caaa13d1d7723da6e6506f942b3027762793e7f10ec3e82d0d926a1c

  • SHA512

    b588df507528773aa26a0f2d539b25b7f3b51142b8363b14f7e5aba8457264a20ca2f17876a81ab9af2511a7b0d0843a09c4d19420a966e5aa2b46e4798902d4

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/b4:zCsanOtEvwDpjBM

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-19_facecb51a7d0c48014952fb03145b154_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections