General

  • Target

    2024-02-12_c84ab7e2092e521dd3b4d6d146b7743f_cryptolocker

  • Size

    28KB

  • MD5

    c84ab7e2092e521dd3b4d6d146b7743f

  • SHA1

    653a5b3bfc7be8225e8353b228b6f3712cccc58c

  • SHA256

    449f7eaa81530fcdc7c8a3a9e36da49404ebfda64ab5ce4289520fac2698a642

  • SHA512

    a8428736ea42f425b31439ee028e2ace3f522cc7b6c59538ecf4b847bcae6ca8f5045b6d747639e1d4afd23a686820205e4acd96a8065ee5434693632aa6a2bd

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+3d:q0zizzOSxMOtEvwDpj/arr

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_c84ab7e2092e521dd3b4d6d146b7743f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections