General

  • Target

    2024-02-04_b4d80163da3a71c0a5873d1e2a03dd85_cryptolocker

  • Size

    30KB

  • MD5

    b4d80163da3a71c0a5873d1e2a03dd85

  • SHA1

    399d19c3adf5120e1959d3e895f334cc9effd0d5

  • SHA256

    6f913b288c9bb141f80b78fa04594b38e0c57a380817313ca8d0d87b5995b57b

  • SHA512

    07d7a81459210271cf6b21b097b62eb1c62ce52b92c24c9e538f3cbc8921217599aeeac7bb1ed0fdfaae9ddd5108357d917105b53a672eecc17605a15eea2e1e

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+jHk:q0zizzOSxMOtEvwDpj/ar1k

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_b4d80163da3a71c0a5873d1e2a03dd85_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections