General

  • Target

    2024-03-18_7f02e5bea721a2f15ae16389696f0ef7_cryptolocker

  • Size

    62KB

  • MD5

    7f02e5bea721a2f15ae16389696f0ef7

  • SHA1

    a0d3cf75495bc633956a134708dd1dab3ea8918b

  • SHA256

    fefeb00d41d7baf837968a6df92a301703fcc0c36eded9b500935790c13677f8

  • SHA512

    21a3cc04f4ba86e31a027daaa7d9ea0328af98f61d7ae0b4952fb61b4593e7bbed45d022a00a6e699be5f6e457477216ff9f5eaed8791c8bf3ae778f05a44a24

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtst4:BbdDmjr+OtEvwDpjM82

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-18_7f02e5bea721a2f15ae16389696f0ef7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections