General

  • Target

    2024-02-04_fa743942e597ed3d94ff97c333e913ce_cryptolocker

  • Size

    30KB

  • MD5

    fa743942e597ed3d94ff97c333e913ce

  • SHA1

    dfb521dfc00d8c84f3b38d136d166c0c07be5014

  • SHA256

    aafa38237d4f2328d02369fe9775e3b758ecdc0893b8390ea1d523984459e9e4

  • SHA512

    93ab4071d2283340b9ff89f597f458473a1593dd97606348f897acd6d44731a2daf0cab6d1458a467da4a1ea767be54fe05ce1163538b45d6f22a24df48b3c8c

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tHiV:q0zizzOSxMOtEvwDpj/arqCV

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_fa743942e597ed3d94ff97c333e913ce_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections