General

  • Target

    2024-02-23_fe80da3fe6edbfe96c5309a6ea33fa79_cryptolocker

  • Size

    46KB

  • MD5

    fe80da3fe6edbfe96c5309a6ea33fa79

  • SHA1

    f37d36280cdff8430e3e76302da8f00544c927e5

  • SHA256

    835fc146477dca9e2b930b0f8c474c653d0964b46bc0eff1c5b977376c343e77

  • SHA512

    ffebc6baa9d670adf0702836c4696e3bde5749342cab67c715b0e799d8e2d03c8d64e4bc22bbd925f53bb19c3022aab3dfcbbf9d70b7bc359986db05b7203bb1

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MobA:qmbhXDmjr5MOtEvwDpj5cDtKkQZQu

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_fe80da3fe6edbfe96c5309a6ea33fa79_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections