General

  • Target

    2024-02-22_1b1e33dfa2c1e4d576dd27d13226424a_cryptolocker

  • Size

    29KB

  • MD5

    1b1e33dfa2c1e4d576dd27d13226424a

  • SHA1

    0210ed42392b97d71b2b4d3d80128c7b2cdf8d70

  • SHA256

    92332d697b4aa22c005ba0023be42125f67226295db4e457bea9fb1d98ea5eaa

  • SHA512

    448ca2d3d1946797a55895d7f7bb598cbfd0e98a4077b7152f038682db913959cd8e66e68e68a1fa94e99604904dd54480a9dbd8d2c8a8d43f8870ad4e22350e

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+K:q0zizzOSxMOtEvwDpj/aro

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_1b1e33dfa2c1e4d576dd27d13226424a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections