General

  • Target

    2024-02-28_11f3569f0dc9f61a41176fcafa317ebe_cryptolocker

  • Size

    29KB

  • MD5

    11f3569f0dc9f61a41176fcafa317ebe

  • SHA1

    5eb5f8bf26273c9e910caf923bae221cd09d3e57

  • SHA256

    01bd37a8e044bc2402faf64e779f160d4d319b1931a8918c37bdd6c2c54af65b

  • SHA512

    4e6d996ffbca4f3436603cbd0348a3fae51ce0648655d634c19e6c729acdd34d86a5abf7ab52c01428199b4414def14d57e30022de47212842ccd7ca25a62139

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4E:q0zizzOSxMOtEvwDpj/ar/

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_11f3569f0dc9f61a41176fcafa317ebe_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections