General

  • Target

    2024-02-22_0b2e1c4d1b5c367f6d4d684a0d48f77d_cryptolocker

  • Size

    49KB

  • MD5

    0b2e1c4d1b5c367f6d4d684a0d48f77d

  • SHA1

    f73166e0c150fb3bdbbf5638b80cd84932d12267

  • SHA256

    3242ebc74a4311353522f047c908c32d5da48e9955cc8608dad479f3ad9965d3

  • SHA512

    1395912be4bf5e44874237110b12e63c03c2037a5f73f3c7022d69a3392c44fe13b0c468ccaae79ecfc07060b72237c48fd35a9679a6a8dc7690ddb5477e4bd7

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUvbi:BbdDmjr+OtEvwDpjMXz

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_0b2e1c4d1b5c367f6d4d684a0d48f77d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections