General

  • Target

    2024-02-03_fbb39c6dc354d8f39765f5b6cafc5a77_cryptolocker

  • Size

    48KB

  • MD5

    fbb39c6dc354d8f39765f5b6cafc5a77

  • SHA1

    5263ec4d251517a3b82ac4d898315a41058f4fe1

  • SHA256

    b7cf3a00f04720697ef5506b593ccb6273c2b0a894582fec22706ed9dc56f704

  • SHA512

    fe383d78b36aa666dce66f9b4b00fbf7a7a6de94bbe27c9cb4be1e64ff512083204898ae2818667c4c37b6ba7822191e3b64779b2c3e26a875b77713dc5f35c5

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUvr:BbdDmjr+OtEvwDpjMX+

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_fbb39c6dc354d8f39765f5b6cafc5a77_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections