General

  • Target

    2024-02-13_69f1037bfff521d993848d162f429f1c_cryptolocker

  • Size

    28KB

  • MD5

    69f1037bfff521d993848d162f429f1c

  • SHA1

    0b9d6c68671b6bffc5816dd828b0fc973def6622

  • SHA256

    88c42345087d618b6593cbf83bd6fae838bf03a2c7d1ca20bdd6fad6940b5c69

  • SHA512

    fe1f558bf6242fff0509a19779ee69b3a157bf36ce460b07a9fff2af305e2ca109609467d085685171c53ec6e8d2090f900686419ab6da2fcce06382bb141878

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+pp:q0zizzOSxMOtEvwDpj/arR

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_69f1037bfff521d993848d162f429f1c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections