General

  • Target

    2024-04-23_fdcea6fbf6636f061b04c0d151df38fc_cryptolocker

  • Size

    76KB

  • MD5

    fdcea6fbf6636f061b04c0d151df38fc

  • SHA1

    91e9fa1f54ac0cf1828b1cca50bf0a542dd6ae24

  • SHA256

    ee6a9589ef953812b60845e839674eedf90ee2cbf8e2e328a12c3fe1cd070c3d

  • SHA512

    d57102f34d280ea9bd1d0398e38a4497dd60ce46f1d15012a4ddc93be6dc8d740bbcc2e57684e16be4ae20c8f16e4fb75d7a283ec3d646d18c49c400662a3c08

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxBW:T6a+rdOOtEvwDpjNtHPD

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_fdcea6fbf6636f061b04c0d151df38fc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections