General

  • Target

    2024-02-13_0faab46aa4fb10a5033ec0b7ecf67c3b_cryptolocker

  • Size

    51KB

  • MD5

    0faab46aa4fb10a5033ec0b7ecf67c3b

  • SHA1

    6a4cb53fefdac5e788e1a492337b48c2fcebbf68

  • SHA256

    340602e8516d812afdaf0f74c122eb0a0a53abc7a65e4ee4bcb7ca6f44443349

  • SHA512

    5b4fbf9d3d796f41a41955913e62d088405f1ffd4e2bb1bd0f50529b0ffb452dba1f8f7be1447a9c94f1891e20e6cc4f81201cae23f095767d8dfd68abd69897

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6Impy5:BbdDmjr+OtEvwDpjMW

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_0faab46aa4fb10a5033ec0b7ecf67c3b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections