General

  • Target

    2024-02-14_4e1aeeb2fabba20e585bb1ff6d7d69d0_cryptolocker

  • Size

    31KB

  • MD5

    4e1aeeb2fabba20e585bb1ff6d7d69d0

  • SHA1

    128134a5d3256a9a9d0dd3fb45ea063d0bd5c659

  • SHA256

    7f38bdcd7dbd28c39c16a2e8876a67f4895729296f0eb9ea951af1c15238dd31

  • SHA512

    d45863e596f1966aa950d19116a83f1885122a12002a643d234985c1e58b56fc64a47d75f1aa81b822d403f47f0effa5f6afc666774d82b66ae594c12eb450de

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tHmNU0:q0zizzOSxMOtEvwDpj/arqcX

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_4e1aeeb2fabba20e585bb1ff6d7d69d0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections