General

  • Target

    2024-02-04_0f92cd59dbe305c105174b41ef3890d9_cryptolocker

  • Size

    60KB

  • MD5

    0f92cd59dbe305c105174b41ef3890d9

  • SHA1

    4ff9416928a76cbdc78b3cfec133a5db33cf645c

  • SHA256

    a644adb01fc8584a2e2afdad73e4895174be80e930be164e8be07b6ac6fa7e31

  • SHA512

    1a7c1d87a8f235df478644be824c01e7c94aeeeb01c7b5b78edddfa644aa17bbd0e905f308028fbe0a335761416fd1c4211ac58b7bffc2ce1eddc6bd41fcde24

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtst1:BbdDmjr+OtEvwDpjM8X

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_0f92cd59dbe305c105174b41ef3890d9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections