General

  • Target

    2024-02-17_f300f3c7137919993562bc77a5b0f1ea_cryptolocker

  • Size

    31KB

  • MD5

    f300f3c7137919993562bc77a5b0f1ea

  • SHA1

    38f5ab0660d91c55562a03fa1a93694a72b3c77f

  • SHA256

    df49904d9a318dd5f4cb0461d0f6fca7ee120d26f92729c61206b915848d5c3a

  • SHA512

    00eaf81589f0627dcb3e0911bf9f646459e70d1ebe69562729edc351b776645ba0b3849c5e2546be54fcad4cc6ebb739ce188d9f3c27022c47fc13a42daff742

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tHmNhs:q0zizzOSxMOtEvwDpj/arqcG

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_f300f3c7137919993562bc77a5b0f1ea_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections