General

  • Target

    2024-02-20_df7b7eb4cb10638ec7229ce0991afad2_cryptolocker

  • Size

    50KB

  • MD5

    df7b7eb4cb10638ec7229ce0991afad2

  • SHA1

    2cd2d862b11d8e59dc98c2033c679eb6356bf8cf

  • SHA256

    d99d0cdcccb10c8ad89a3246312e42eca0bcbfbdb46d61e298e4b6f240ca3881

  • SHA512

    e416b2833e170dc0d9d627124d9c2331d7941af6490aee7d353728c36bc4f37111da10c3523369833391ef8c9d5d6634c5ec2119f8f9c7cf9db0f8f4d558842c

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6Impgn0j:BbdDmjr+OtEvwDpjMN

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_df7b7eb4cb10638ec7229ce0991afad2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections