General

  • Target

    2024-02-13_729c93472afc49f6376a254730e3e4a9_cryptolocker

  • Size

    49KB

  • MD5

    729c93472afc49f6376a254730e3e4a9

  • SHA1

    0ddaaa3f63780e58fc047d880f196415226d4fcc

  • SHA256

    c739334036963ddd0b5c855d57a3e2a92a514270888894216252c4ec3efe8a0b

  • SHA512

    e7ec90561e9a245a0f46ad469eda6680922434ff443ac6110bd53618bc978c95dd887331d0251480024b066cb69b8f21bba52c7b8a6eede16d3ddfc17a68526c

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUvL:BbdDmjr+OtEvwDpjMXO

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_729c93472afc49f6376a254730e3e4a9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections