General

  • Target

    2024-02-18_7aa4e930504c27f411c6dab9c96e69fb_cryptolocker

  • Size

    61KB

  • MD5

    7aa4e930504c27f411c6dab9c96e69fb

  • SHA1

    c0a7f811951a91b65a010e2ddc664503ee183a49

  • SHA256

    45f5737d0603912f714b9eaa08740ce21f81fabe05d28883c0dc1187c4ca530f

  • SHA512

    5fc210760421b23319fc982556556a734b156197b58eff31ffc75eed80d604a4745b251a5dd3384a3393ade1b71a8211b7fe8a185e029fe0c0fcc3527a3ee7bb

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtskPK:BbdDmjr+OtEvwDpjM8n

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_7aa4e930504c27f411c6dab9c96e69fb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections