General

  • Target

    2024-02-17_0aa3ec2f42ceed383da8b3d8c36fb84d_cryptolocker

  • Size

    61KB

  • MD5

    0aa3ec2f42ceed383da8b3d8c36fb84d

  • SHA1

    1e23ef6523bed667c640fb38931a9f53529f12f5

  • SHA256

    eb2f7d2173cfb5fb4f7b11858b24418624a713bd89bd72ab07d8908e52c5cc03

  • SHA512

    c1c316c68e18e924778f2812f40cc16bbe48e5dd2e3e3586710f743d5441e41602cb892f0ea94bd73993e977b37d2299e80e7c94673d6f173e21d02df148a30e

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtstN:BbdDmjr+OtEvwDpjM8v

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_0aa3ec2f42ceed383da8b3d8c36fb84d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections