General

  • Target

    2024-02-13_07b4baaaa5b047681d361da9048ae76d_cryptolocker

  • Size

    48KB

  • MD5

    07b4baaaa5b047681d361da9048ae76d

  • SHA1

    1dd885b2e39ef9fcdf6c963292b920d7ad3ec7d1

  • SHA256

    bf0fc28d953408eda649d258dae29afea8807ac361196e030dca1929749747b8

  • SHA512

    ce070d9c306a45f9447a02680eb6cd46ac904d917426f81b0be298ec59761908f2cbf38305671b1ebd241876b6717328a74286195ecbf4a4bf878778901b7990

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB52zF:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6uIU

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_07b4baaaa5b047681d361da9048ae76d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections