General

  • Target

    2024-02-19_fb3225264d43ab85e10f0044ff3fbaa7_cryptolocker

  • Size

    31KB

  • MD5

    fb3225264d43ab85e10f0044ff3fbaa7

  • SHA1

    b1aea37e25e5b34735e6a2fdb6892db25b827d33

  • SHA256

    ccb4b04f77481c812a195a24aa291d660e810e8c085dbc808e90da4c64dff1f6

  • SHA512

    710a673037b1e4c2a49a399a35fb0c9c92ed6a0bc30d6ed713c4a80a3d1879ebca35c9eee3d64c92680c5a6776147285ea85d01616b3e3fdc117c3cc52006c0b

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+jHc:q0zizzOSxMOtEvwDpj/ar1c

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_fb3225264d43ab85e10f0044ff3fbaa7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections