General

  • Target

    2024-02-04_d39f1f1ed2bcd9a92e2b6b83864a56c3_cryptolocker

  • Size

    45KB

  • MD5

    d39f1f1ed2bcd9a92e2b6b83864a56c3

  • SHA1

    8999a0b9e186ae749c14764a900d10204461a93a

  • SHA256

    765bdb86b4b0880f71a5714f6bcaadf357e586b951075e4997ef0211116c2c29

  • SHA512

    3d1049f08d0c5d74de09c4d809691f5828ad8758baed5134144db14a8f48f3360db2893c2905706931af37a97c0ec666d4c93b349873c19583b4a854c195f6e8

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MocBB:qmbhXDmjr5MOtEvwDpj5cDtKkQZQSn

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_d39f1f1ed2bcd9a92e2b6b83864a56c3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections