General

  • Target

    2024-02-13_c433d59e51e623bf38f039d8a555d897_cryptolocker

  • Size

    30KB

  • MD5

    c433d59e51e623bf38f039d8a555d897

  • SHA1

    71aaf167a5e6df205039845376a07933472570c9

  • SHA256

    7b58ae79658c38f046dd537b88167ef9e721f3b4d74c887f442b10afc9f4137d

  • SHA512

    b7d8ab87063400a6c067994010a3163a1ba8b5ad9b1c48d6969c0345c68dfc6efa124ec5df0d219c17a608f5cb1c280cd8bc364882978c175f8b3568e897bf14

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIO/xTD:q0zizzOSxMOtEvwDpj/arp

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_c433d59e51e623bf38f039d8a555d897_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections