General

  • Target

    2024-02-13_d99a4f58bff7d3f79109332e11361d04_cryptolocker

  • Size

    31KB

  • MD5

    d99a4f58bff7d3f79109332e11361d04

  • SHA1

    24a7b6a39a9fdaf47fff6ed223bad6f9fe9a70b0

  • SHA256

    0fa3dc03bdffe8d0ed8bb26a8d83c3d44ce03fd59ad7f351213f6591f1d999a4

  • SHA512

    0e360fb72b6b0a407e2e910f59e04c49e91bdec343381e898cf3a0b8a027150b8a10f1ac2c1f8425e353e677e82bd8ae0e45dd0305c5be45c8cb9b65f07fc7f5

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tHmNP:q0zizzOSxMOtEvwDpj/arqcP

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_d99a4f58bff7d3f79109332e11361d04_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections