General

  • Target

    2024-02-04_c7b04465809e78ccb109d51bca4a7298_cryptolocker

  • Size

    30KB

  • MD5

    c7b04465809e78ccb109d51bca4a7298

  • SHA1

    fbe3dc8a4aae6b0517c3154d247039a4a3a06420

  • SHA256

    963befc1796857837f0d605eed915e8c78ad9f9d3317d453eeb1522523dec010

  • SHA512

    059f44ffc0e3ebbb09d558c426ed95b9a8148de7580321061a4b67aed5f933b2e1780803a31304fff246166653e944832d3788ed738286ab44d18c50c5199f1b

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+jHE:q0zizzOSxMOtEvwDpj/ar1E

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_c7b04465809e78ccb109d51bca4a7298_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections