General

  • Target

    2024-02-02_8f7391c00114c0d8a7d5fd7f167532fa_cryptolocker

  • Size

    45KB

  • MD5

    8f7391c00114c0d8a7d5fd7f167532fa

  • SHA1

    6a98bfb5153f2ef21448503a7edec1631afd73d1

  • SHA256

    739c0dcbe1fc064d58707b8469407ee8780f8cb0ab45b8f8c3a2456ee0957d37

  • SHA512

    ae45d1819fa9cfff3462063d788424a1f5a5e4406b5f5c228683f956ec8abc7631f61cad6c5eca31cbbf25146b3873b31cda09d569ffa0b80a6317b745c2f89f

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Moo93:qmbhXDmjr5MOtEvwDpj5cDtKkQZQS9xB

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-02_8f7391c00114c0d8a7d5fd7f167532fa_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections