General

  • Target

    2024-04-23_0ff7f063ca95239f0d11b1755b80ab6d_cryptolocker

  • Size

    27KB

  • MD5

    0ff7f063ca95239f0d11b1755b80ab6d

  • SHA1

    5a679e8227b97647fd39824994e0074c9d68b939

  • SHA256

    30b6c0147762b54b9b7ea1716af9cc87f1f12e2fdbd343d4f708c57b8d889f07

  • SHA512

    24295e51ee0a8821e97a43969fe84c484a8932786ca5b3fd62d755390e2499535e2557516ae6d0a5e24e326363fb9d87db6bc2d2fa2405275908671cbc59984f

  • SSDEEP

    384:qxOZzyjOnqGAs+8ULueO4NdE8tOOtEvwDpjqIGRYK1sGGYkxOqj:q0ZziOWwULueOSdE8tOOtEvwDpjeYj

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_0ff7f063ca95239f0d11b1755b80ab6d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections