General

  • Target

    2024-02-11_1a4db32e71ddc86f420caa56879c93f0_cryptolocker

  • Size

    34KB

  • MD5

    1a4db32e71ddc86f420caa56879c93f0

  • SHA1

    c540b2a5a75fde6e313ae5b314380a3d4be7e205

  • SHA256

    74dc388e4c229c709c6c0312a94ae62107b3b1e844df21f395c67a13c43561d2

  • SHA512

    c4c1c7f4a1ba487b8322c03fc9799af151268bda1359ac8ee0d1ea3f3073272422a333cca20f1565455540b2059ef719abb35b254035ae207a4d40e0f66008e3

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoWDeq:qmbhXDmjr5MOtEvwDpj5cDDq

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-11_1a4db32e71ddc86f420caa56879c93f0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections