General

  • Target

    2024-02-23_2fcaa2e6e88d2b4b0b013aa2ac2dbf79_cryptolocker

  • Size

    61KB

  • MD5

    2fcaa2e6e88d2b4b0b013aa2ac2dbf79

  • SHA1

    f73a34541dcad69da9086897fb05b13c01b36d3b

  • SHA256

    8a5bb72021c432f5ddfa002e1362f2635adde3f844ba47d79ec8b7b9ed981b13

  • SHA512

    d8561923b695bd4175caf172116b49d4563ab3679b9f319d1e33271ae98385edc52e703e274dcf1a71b97d866cda36f4d6bde2a81e62576a70e58a3042f66689

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtskPu:BbdDmjr+OtEvwDpjM8z

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_2fcaa2e6e88d2b4b0b013aa2ac2dbf79_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections