General

  • Target

    2024-02-19_f0a7e207b71294d9dfd5d734239fa326_cryptolocker

  • Size

    32KB

  • MD5

    f0a7e207b71294d9dfd5d734239fa326

  • SHA1

    0e9465ce97cac280c4856b3b7028984a11e301f9

  • SHA256

    1d4531358cc86a73c3a518a328e6759413a9ecfb3a38380876341330d315e510

  • SHA512

    3c00a25d1b57b10a7c45734027ee1d8015c74c5f26d7cffdba4d56b0e739a48b38ef98da8c2fd6531ae6c20fea7eca1d9641a85686ce08287461ac139f22ac5b

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tHmNUP:q0zizzOSxMOtEvwDpj/arqcc

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_f0a7e207b71294d9dfd5d734239fa326_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections