General

  • Target

    2024-02-28_b0fe095d9941d785cad1f0c83454f5c1_cryptolocker

  • Size

    56KB

  • MD5

    b0fe095d9941d785cad1f0c83454f5c1

  • SHA1

    b464726b4730a5bfc14ac2d1c8eb4e780b7303a9

  • SHA256

    1268497201bc8ded81397a880d6810ffce789d09730a2395af38d67dc97a8b14

  • SHA512

    dcd7cca5c2cf3d85f2fd6c3913ca4a0b3cb6ed3bf8f2574b85ccc96cad429de860c69ae08c2ad59092e565d759286c5236aa49d6d31a11cdb4debefa397e8b43

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb613:BbdDmjr+OtEvwDpjMh

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_b0fe095d9941d785cad1f0c83454f5c1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections