General

  • Target

    2024-02-24_0b400b00592e8561c94e627558820a23_cryptolocker

  • Size

    56KB

  • MD5

    0b400b00592e8561c94e627558820a23

  • SHA1

    fddac30c09cf15b5ee8c690009ffd06f800ddd49

  • SHA256

    5a891afdde218ee7c69faa42b951d0696cb17f52f37afe104064d47a08585b93

  • SHA512

    22cccdc121eeb986e11c2a8fa2c78d6ea0b174985e4db81a57329a92b58d6e0b28d992ccaabecd6ae71d62fe1165337c77970119023380b1a177cb87dc4f89d9

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61FGH:BbdDmjr+OtEvwDpjMa

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_0b400b00592e8561c94e627558820a23_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections