General

  • Target

    2024-02-18_f2bb6c3717db842c20aee0f207720afd_cryptolocker

  • Size

    48KB

  • MD5

    f2bb6c3717db842c20aee0f207720afd

  • SHA1

    06abdc3b5a9cc8b70e144bd17f65cdd881d19b13

  • SHA256

    54b9ae93b66ed725ff887e00f4294855bccf21268ac31a7fb30d856b5a1242bb

  • SHA512

    e1fcc6c63b1b2dccb31609ab38f19180890e8eec7497c89c1a35687e469ba31e70f1917157395693ce653ccc10b7f22c4ab4d1793351c87e909c3ec8a66ee90e

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB52zS:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6uW

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_f2bb6c3717db842c20aee0f207720afd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections