General

  • Target

    2024-02-04_ff56c818a17e29ad568e1687b9803cb4_cryptolocker

  • Size

    46KB

  • MD5

    ff56c818a17e29ad568e1687b9803cb4

  • SHA1

    7a884c12318477e8c725eaea4349b4119e2ce8f3

  • SHA256

    c11f826de08e19992bcda465eddce69a2fa96d11c0733b313a1597bf2b5345ed

  • SHA512

    26aa5045831b8a8e65c124aa9387f0d320347caa08d7fa048252864cbaa9326260a93db1627e07c2d4da79d1c5d0787d144470b4c550f306ef52f2de46f431ae

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTBE0p:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6S0p

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_ff56c818a17e29ad568e1687b9803cb4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections