General

  • Target

    2024-01-29_44970fbd2e905d4bdf09742682f7f00b_cryptolocker

  • Size

    44KB

  • MD5

    44970fbd2e905d4bdf09742682f7f00b

  • SHA1

    5f7b3ce4655d87ce70fcb63c7d7b153df9dc88c4

  • SHA256

    dd265d41f289aa2da5a847bd535fdf20a8ad6a2dff5882da9f8245207e74ddfb

  • SHA512

    e181beb8be66a1e2c250601fd79eda074305f4efa793c046dc7945d9d3bbb0e6957c0f8aa5ef5a54a09adaa6ea1aa1ed2f0244e181640fa9339095b7e52049d1

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoG:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ0

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-29_44970fbd2e905d4bdf09742682f7f00b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections