General

  • Target

    2024-05-08_fcbc58a7b32dc428612df33b35138c83_cryptolocker

  • Size

    39KB

  • MD5

    fcbc58a7b32dc428612df33b35138c83

  • SHA1

    fe6996922520c181a0961f5ae7829a7784f60869

  • SHA256

    63d4bd548b8569af359a73ea35bb22decd08c129c9295ee6975deb6d21d21d71

  • SHA512

    9551063fbca26c1916705314f4950b538327cbd195216f95c17bc662fa70ec17517b0a9d3c230d8266d853e235cd6ee06b84567ea60deff2ac186583edf2cbf4

  • SSDEEP

    768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYaVkh:qDdFJy3QMOtEvwDpjjWMl7TdG

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 2 IoCs
  • Detection of Cryptolocker Samples 2 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-08_fcbc58a7b32dc428612df33b35138c83_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections