General

  • Target

    2024-02-01_3797fb39e5b57836cf414af7219dea38_cryptolocker

  • Size

    44KB

  • MD5

    3797fb39e5b57836cf414af7219dea38

  • SHA1

    febb75a8502aef83ba5f5b26564df5fa44493185

  • SHA256

    04256d5af022e41fdefa60fb1bad3719e0f478759c4c71405d97a2954d71c7dc

  • SHA512

    b4cb22506e6cb4530ff0ad04a675b9f8de352bd493e7e4a9630d172e93d85778047be977d86315c3345159aa3c36d88f522874dfa84d9b32613d70df46e0a5a3

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05O:qmbhXDmjr5MOtEvwDpj5cDtKkQZQO

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-01_3797fb39e5b57836cf414af7219dea38_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections