General

  • Target

    2024-02-04_0adae0c0914cc4af93f4e4434b14dee8_cryptolocker

  • Size

    59KB

  • MD5

    0adae0c0914cc4af93f4e4434b14dee8

  • SHA1

    5cf0b35f97946b8c7b1e9ded0ee90fcd343065d5

  • SHA256

    5460927420561a83360c818a727e5ea4d3898e3fc16efd215f7de6ab0fd911ec

  • SHA512

    eca17d5fc931bbd5fbcd543fb6bc142fb83320b3850624c9c933b6d28b49e2bab58729b615528d4518eaca7d906855a459b8b9d12667de7c6169ab8f357385a2

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtse:BbdDmjr+OtEvwDpjM8W

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_0adae0c0914cc4af93f4e4434b14dee8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections