General

  • Target

    2024-02-19_ffa4672cb20defe3629dbf683b1dc5fe_cryptolocker

  • Size

    31KB

  • MD5

    ffa4672cb20defe3629dbf683b1dc5fe

  • SHA1

    8f55b553f399868816e5613cab24826d4fb15f93

  • SHA256

    357813c8f50e25401374bdf05015cbd0ddba0e8a027edd3ab452e14a9bfab128

  • SHA512

    14d9203d5ef9181eef92da072c60dc6ddbd9302e95a4bf483e7ebc31b38c5f2eada8c20a62057b9a511527077b2747b98b90e57a7e6de918449afe798e429570

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tHK:q0zizzOSxMOtEvwDpj/arqq

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_ffa4672cb20defe3629dbf683b1dc5fe_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections