General

  • Target

    2024-02-12_10502ad9f4bf04ecf71d0393eb9fe7b4_cryptolocker

  • Size

    31KB

  • MD5

    10502ad9f4bf04ecf71d0393eb9fe7b4

  • SHA1

    218ab4d6db8164fbfe9be31108614960786bc54f

  • SHA256

    bf83d40c400debacbbdcb3e0386e37f021bd055fa6e9c5221c7f23a0c6e87bfe

  • SHA512

    1ab51d764b87bc6c0f9bd3206ccf12a4d5277dfaa53adcd57c6815f0d0c89706dc8be5f00191f794ade1ad86befe64a551b828d844f3f1e68fcdfcad06a0007b

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tHk:q0zizzOSxMOtEvwDpj/arqE

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_10502ad9f4bf04ecf71d0393eb9fe7b4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections