General

  • Target

    2024-02-04_79fe0f0d02c5abb9ea6d8b9b9a19ed13_cryptolocker

  • Size

    48KB

  • MD5

    79fe0f0d02c5abb9ea6d8b9b9a19ed13

  • SHA1

    35a5c19007604652fa127a8a7d825af40e874a21

  • SHA256

    74fa2d7e1279b08e6bcd2355ca5799af7cd6a5aa574b0fea528640888c32ef04

  • SHA512

    8687db4af993ac992494d2bbf68963e31c2fe0812693990e49e8ff4c1b4bbc5a488eb40532a21158be32edfb9e39c5de461c3a1471436304225f4f6a4e6a6c2b

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUvP:BbdDmjr+OtEvwDpjMXC

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_79fe0f0d02c5abb9ea6d8b9b9a19ed13_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections