General

  • Target

    2024-01-24_4d824e53345a226f8d8e6540d3198b7f_cryptolocker

  • Size

    44KB

  • MD5

    4d824e53345a226f8d8e6540d3198b7f

  • SHA1

    11def1f6da062634ef5a21e70f963f0ec9e56c7c

  • SHA256

    f2201d765ea42f8595df27ae71b4a02f8c1089955390b376fdff0d49802d55e4

  • SHA512

    79bcf0b29c3af5f6bc3db937a0b800a752af7054a3a5af33b5f9b7b8b583a9d1e6bc1a0694466beb3b2f60bc6642356180c7545d6c84a70b27b59c146ecaf22b

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05Wa5:qmbhXDmjr5MOtEvwDpj5cDtKkQZQb5

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-24_4d824e53345a226f8d8e6540d3198b7f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections