General

  • Target

    2024-02-01_8b1ed9fa15d52415eda7b8221069550c_cryptolocker

  • Size

    30KB

  • MD5

    8b1ed9fa15d52415eda7b8221069550c

  • SHA1

    f1e9a87c6822b8aa6b0cb2f0d5682e0a12688a32

  • SHA256

    9060430d4df81b7808465e621f9529de9f28fb28f8f725943c961a47b4b0bb6e

  • SHA512

    d65aaa26a588c0f794cca3822d6fe997785e3c7d83a352323ab699d3db1248597bcf7ead4b356973e8b65362628ac38bde6f426e4c33916e0e8591f4df8e9268

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tHs:q0zizzOSxMOtEvwDpj/arqM

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-01_8b1ed9fa15d52415eda7b8221069550c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections