General

  • Target

    2024-02-28_fe151c53855567ea3d768a421153d4dc_cryptolocker

  • Size

    52KB

  • MD5

    fe151c53855567ea3d768a421153d4dc

  • SHA1

    f583f63e92685622c72417bf5aa87e20332ae77d

  • SHA256

    bffc21fca0790a3b7824b65203554effc2c89fc3a0c3b015b379b2fd274d4a32

  • SHA512

    d828a596d83300446c59d1795300f772a7cd2771025a7f3abfa20426c1df572ceb1da5d793a7f45a98be22b7132c9f428b61dcfd433e19ef76bbc255905c7e8c

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6Impyi:BbdDmjr+OtEvwDpjMF

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_fe151c53855567ea3d768a421153d4dc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections