General

  • Target

    2024-02-04_297f20a436cf3e1a025f6bebc37891c3_cryptolocker

  • Size

    30KB

  • MD5

    297f20a436cf3e1a025f6bebc37891c3

  • SHA1

    eae708f2bb8fad1fe25b70fa0b8a3deaf899f368

  • SHA256

    a58978c1d9db9bb4b006f6722e980ca2226f0c12617dfef17616c1315ff8aa06

  • SHA512

    2c83880f875e72bcc381e39fa89fa398e76c964221ff9807ca49f62f90420e874fb7c60d70fca7c85472df3813f6912a286bc289214ea2dc3b8bd1193b105ebc

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+jH1:q0zizzOSxMOtEvwDpj/ar11

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_297f20a436cf3e1a025f6bebc37891c3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections