General

  • Target

    2024-02-12_0ca5383cc76f501d1820f7ccb8e496b2_cryptolocker

  • Size

    55KB

  • MD5

    0ca5383cc76f501d1820f7ccb8e496b2

  • SHA1

    fbde2cce43ef7483e9e524ef5bb15964b15eac0d

  • SHA256

    b60423251827736f3fc139e4832c4079d24c062f8fb605c0398e6fd32d912158

  • SHA512

    8bcc63355c93676364a5322fec868921537480ae7440ad472be765e73d8187a0370bea708b9ba99596ae10241233e22f6df608264882cc6aceaa88a0d3759713

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61U:BbdDmjr+OtEvwDpjM+

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_0ca5383cc76f501d1820f7ccb8e496b2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections