General

  • Target

    2024-05-10_fc0b441ffa9fc06427345c959e757abc_cryptolocker

  • Size

    52KB

  • MD5

    fc0b441ffa9fc06427345c959e757abc

  • SHA1

    164f12e7b6a26c0fd684a6e9fe328f735689ac98

  • SHA256

    975d8c1764967bdd3b7f6340657752ebef97e754810581226f0ce03ba8310b70

  • SHA512

    bd8cf5acd524845995b8a4973995d7a116170d6ca80a3cfc0762f0ab56e785ce37579c56f11fa3be8297bef1ae921b2a6a18576fe133ca944b2a644caa7237ea

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTO09:z6QFElP6n+gKmddpMOtEvwDpj31i09

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_fc0b441ffa9fc06427345c959e757abc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections