General

  • Target

    2024-06-11_fd391bf4aa17cab5d35fdd3ec3110ef3_cryptolocker

  • Size

    53KB

  • MD5

    fd391bf4aa17cab5d35fdd3ec3110ef3

  • SHA1

    b5ae542efeeb1e212960418c91ca82738ba86462

  • SHA256

    1ae59d9f183954c8b3e37977a520b476f8939fde0cc9ccd0345ca914e8dd5e09

  • SHA512

    5a00b2f831e28542c23426c7004d30af21f6cb43c76be07924494b5a799bdff6803c9096a3b23671e5dae0c24b0a9e8c41f6792129e035c81cba62ad234972b8

  • SSDEEP

    768:z6LsoEEeegiZPvEhHSG+gzum/kLyMro2GtOOtEvwDpj/YY1J+OTOmY:z6QFElP6n+gKmddpMOtEvwDpj31imY

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-11_fd391bf4aa17cab5d35fdd3ec3110ef3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections