General

  • Target

    2024-01-29_194be169884244d4ec888bf9a731a4b9_cryptolocker

  • Size

    48KB

  • MD5

    194be169884244d4ec888bf9a731a4b9

  • SHA1

    410d36c506e3788055fb32f66633c24062256f8e

  • SHA256

    08e45fb84d5236459820e27617dda08395cb4d34472c09416f04d38587134d1a

  • SHA512

    1c1891bf2efad40ef334917e37ef742696ed6892ad34f85e11e052713f428b4739b7e4f1079580fe9279e5f3ba63df76d42d11bc8984eb4e31b7dbd33fb1cf5c

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB52/:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6u/

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-29_194be169884244d4ec888bf9a731a4b9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections