General

  • Target

    2024-02-23_bb2d415371e191493e6af479c94c4594_cryptolocker

  • Size

    31KB

  • MD5

    bb2d415371e191493e6af479c94c4594

  • SHA1

    c0237cc5a7cf439839386878d46bc1473723cb8a

  • SHA256

    ca8d87f91a1f3f79c66bb28ab6024889a7811b5ef0982f1dedd59028d12119aa

  • SHA512

    ea977b133e2ecd179ab7317ed4b099a242b3ef6236ce226c83e7eb6368852877e0df84f4fa3a0f4207ff047651baceec7d1ce315db394081553a88ad28eb2420

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tH3MY:q0zizzOSxMOtEvwDpj/arqr

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_bb2d415371e191493e6af479c94c4594_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections