General

  • Target

    2024-02-03_6790a68c24de34392fe62919e92bfbf3_cryptolocker

  • Size

    30KB

  • MD5

    6790a68c24de34392fe62919e92bfbf3

  • SHA1

    96fe87e7fb281c6f4dd089e235faa5e1ce075f7a

  • SHA256

    e252982aca933956cae6ba82b1cd1462bf7de0292eef778c75baeac3833ff824

  • SHA512

    7a4fb7dc8f5a062448f379bdf5b9c2f0bb6b8d764dd86df8df67c5b50be03a80e1b5e7124b09db3647aa57e331c54b40025c77bdd6007d0413be18fbcb4f06ac

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+jHR:q0zizzOSxMOtEvwDpj/ar1R

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_6790a68c24de34392fe62919e92bfbf3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections