General

  • Target

    2024-02-20_330ead98ad35bced0dc29a97238d4371_cryptolocker

  • Size

    61KB

  • MD5

    330ead98ad35bced0dc29a97238d4371

  • SHA1

    036b27325fcc50c5630ebd1b7d35d9e4b9533287

  • SHA256

    e694b63601e60335e72c03b9594e4f6b16ffeb9ef360583633ed6599d178f2e1

  • SHA512

    43e327eb0fd46f9d9266697a6dd8c10b152d0874ce37c3947683fd1cc1b989ca5e0b0ebf84024e3c83efdb3f32aeab8f0b40ef253411043b6818eeb07165bbae

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtskP/:BbdDmjr+OtEvwDpjM8a

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_330ead98ad35bced0dc29a97238d4371_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections