General

  • Target

    2024-02-20_adbb66692e0b7a3553545e5bd53c26d7_cryptolocker

  • Size

    31KB

  • MD5

    adbb66692e0b7a3553545e5bd53c26d7

  • SHA1

    3d61ca5fd2c66e99f95ed2f684f78e515663934d

  • SHA256

    df065dab774d97e1a8bca50496e5e34a6cf96680dc5e20037dbc6ecd4ba5d233

  • SHA512

    131a0a42ee741db5c6f46a397eb5e8771184151932d5344b781291a60e51465853e8277ebe2755f19bfd766a356bad5347b6250e844086824f8263cde396253f

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+jHA:q0zizzOSxMOtEvwDpj/ar1A

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_adbb66692e0b7a3553545e5bd53c26d7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections