General

  • Target

    2024-06-11_fcf0aba0ab2223f43801c451d829877a_cryptolocker

  • Size

    79KB

  • MD5

    fcf0aba0ab2223f43801c451d829877a

  • SHA1

    9ccc7b92518ac4cb6babf79e931cd66629f65e81

  • SHA256

    34a7a5a1240c0bde3cb7fb6be225d9e7e596a2f35c3b112ca146bfbe6fa7583e

  • SHA512

    ca2ac7f00d8d52b9e7027aa1dd768e41d4b19bb47948e0c5bec50bb367a2df4fcef5e7e68b779f44d13cc27078a04537574805c3b1519762bd7368eb812e6c59

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxn9:T6a+rdOOtEvwDpjNtHPO

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-11_fcf0aba0ab2223f43801c451d829877a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections