General

  • Target

    2024-02-12_727e6e4972684892c00fdd3a4fc7311e_cryptolocker

  • Size

    56KB

  • MD5

    727e6e4972684892c00fdd3a4fc7311e

  • SHA1

    1f6ce47c7704c60848045007802d8dffe1829462

  • SHA256

    09c27ecbbb471195cde7324f25f2869565612827092d87df1f403a65bedf82b6

  • SHA512

    afe5c80903e467b7890364ca2dc6ed5d68bab1c5499261db190f5c9589dbeac1904abcee5ba9dd7c37cee970f92657e3b862f390f28b0c1ecc5e9b85673c16c2

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61i:BbdDmjr+OtEvwDpjMw

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_727e6e4972684892c00fdd3a4fc7311e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections