General

  • Target

    2024-02-28_f7ef1a0f43f3973a52e8622d99acad93_cryptolocker

  • Size

    34KB

  • MD5

    f7ef1a0f43f3973a52e8622d99acad93

  • SHA1

    2b1594657f89962de3a659dd952b60071c1789b2

  • SHA256

    4e05d202b07a1ec3f36f43bc5c7e48252525bc168132299c5dc8e3684584de59

  • SHA512

    b44633319dc7676f8bc6db55ddaea106e52983d1df5d65e02c370702c0ff4f4c57120b79a32da73eceefe85a2fdd759cfed8ee4d9ff00199493f4a2debe2eb54

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmouy:qmbhXDmjr5MOtEvwDpj5cDF

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_f7ef1a0f43f3973a52e8622d99acad93_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections