General

  • Target

    2024-05-04_fbca5a542082c4e1cd367c57b15bf2a0_cryptolocker

  • Size

    55KB

  • MD5

    fbca5a542082c4e1cd367c57b15bf2a0

  • SHA1

    2a179bdd737a47d5ddf4b6bc640fdb101436f552

  • SHA256

    270beb3a94c757b91d655caefed7c65145e9adf070479d424fe299e7f8e17270

  • SHA512

    7c6edea5603d75673adc05cc0a83f20207c69845cdcf588b5c07640eab7ab89a2e9a73a223e1b60c08274fa52ddfec47e77d7a0830cdd3a7303e531d689c0395

  • SSDEEP

    768:bP9g/WItCSsAfFaeOcfXVr3BPOz5CFBmNuFgUjNR:bP9g/xtCS3Dxx0u

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-04_fbca5a542082c4e1cd367c57b15bf2a0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections