General

  • Target

    2024-04-20_fb5df5d9cc91e517bf4cccff42ee5710_cryptolocker

  • Size

    50KB

  • MD5

    fb5df5d9cc91e517bf4cccff42ee5710

  • SHA1

    6f96b4606754e5ed9998c4d9da47892841b3753b

  • SHA256

    fdefbea2d915dbd4eda2708e0dd438630c7008ee5c36c59f861a16826b5325e6

  • SHA512

    4538e9c9a107535b29c94ddfe9b91dfd348256b57503b40e3b5e90b9d2480a78bf2085d92e0cec3ed92c743877945e2ce12362bb61438eb737658ad239d862f7

  • SSDEEP

    768:bODOw9UiamWUB2preAr+OfjH/0S16avdrQFiLjJvtA:bODOw9acifAoc+vA

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_fb5df5d9cc91e517bf4cccff42ee5710_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections