General

  • Target

    2024-02-02_0448f7a1a15ac1d9a1307ca84619bd2c_cryptolocker

  • Size

    48KB

  • MD5

    0448f7a1a15ac1d9a1307ca84619bd2c

  • SHA1

    0ea83e22087005ff793997e57faf6a1459ebd3c6

  • SHA256

    1aacd6fb59ab64d704ff5e0840056ef4713e42ee0f2ed3661d328fea8869f8a4

  • SHA512

    f988ac10aa668c80cf94522a1adc4e60add44935f50b5feab64e6e8575bcc6e726325183b9b872cd29158ffc16d3d2b88b5fae92090856ef66993d359174f631

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUva:BbdDmjr+OtEvwDpjMXP

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-02_0448f7a1a15ac1d9a1307ca84619bd2c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections