General

  • Target

    2024-06-03_fabb9ab8ef97c3ad8c644c339a538813_cryptolocker

  • Size

    79KB

  • MD5

    fabb9ab8ef97c3ad8c644c339a538813

  • SHA1

    d6138efcdebaac808516891c8c8f9a11bdd1d1a5

  • SHA256

    b32bc742d3162f89edf5d434497df5d10ac9b094941836c3ad51440dd1d417fb

  • SHA512

    03d7d784672d7a9d1ab363da301b25d16ce36208d30d06b39d8da279f50341d3066a4a2e97307f589c2583b3722ac3c86c2ac3b7a71bd2b953669fbcb04ee67f

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdJcRO:T6a+rdOOtEvwDpjNtv

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-03_fabb9ab8ef97c3ad8c644c339a538813_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections