General

  • Target

    2024-06-11_fba9ee6b7cc6b80be300eb4d92883522_cryptolocker

  • Size

    78KB

  • MD5

    fba9ee6b7cc6b80be300eb4d92883522

  • SHA1

    f8098508ad5f8c6454cfe902e678b6bcb5bd4543

  • SHA256

    4f1a48021a60a7fc5cac1631ea8aa5acbdc512a9cdb7e0b54978da365c708ce4

  • SHA512

    642e927bd1d9c8e9c3db27aea6b5230df12cbcf463b614380feac72f9211d392480e50de2af8c1c46b914ffb390d67c46db836db7d69126ecb9b0a1804dfc975

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxnFK:T6a+rdOOtEvwDpjNtHPwK

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-11_fba9ee6b7cc6b80be300eb4d92883522_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections