General

  • Target

    2024-04-20_fffd10f8bf785f31221cb16100cb6976_cryptolocker

  • Size

    89KB

  • MD5

    fffd10f8bf785f31221cb16100cb6976

  • SHA1

    51910936414e26019a971f4f9a46f20934df6e34

  • SHA256

    da15eaef48649579c2ccbf4da244e8e3b6fc3eef2d4fb9b70377f57094bcdd8c

  • SHA512

    f55e042ab104d855fe382f33cd3a2b25d92315f2fa68df09dbadf7a41afbff3ebfa871abb4dfdbbb81b5c01fd4704becac4f37fe076d1693974edcb5dc5540ce

  • SSDEEP

    1536:n6QFElP6n+g9u9cvMOtEvwDpjYYTjipvF2bx1PQAAC:n6a+1SEOtEvwDpjYYvQd2Ph

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_fffd10f8bf785f31221cb16100cb6976_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections