General

  • Target

    2024-02-20_5f1e9e3158585e00d0260050c3107b4e_cryptolocker

  • Size

    31KB

  • MD5

    5f1e9e3158585e00d0260050c3107b4e

  • SHA1

    571c92dd051dfc05b5703522970e42c7ab593313

  • SHA256

    303c327951ac2bfa5c7e9c823ff4aed4de6a9db3cd459926ca312722b31a7b01

  • SHA512

    68ba57599fc46c579184c294baf0701bb4f76309b27749d02dc189a7accf361f35924535b1e968f474914c75eb89cb2349e51673d191ec27733b576193567256

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tH3Ml:q0zizzOSxMOtEvwDpj/arq6

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_5f1e9e3158585e00d0260050c3107b4e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections