General

  • Target

    2024-02-04_06921d801d4db673d690ad7735b788a5_cryptolocker

  • Size

    45KB

  • MD5

    06921d801d4db673d690ad7735b788a5

  • SHA1

    9e4bfe93a60770dfaac3126d4c6e6e00d038d691

  • SHA256

    9c81fdcc9e15bf99f9fcf66b93fe83565df01367b764ced63e6073230c825ed8

  • SHA512

    6b8d687bf5e5672c49c530399d5a02d3718b8ff4f7de239acdc7821a4b23e68fe1e5b3392d9f3656c170af32e3acffc6164d233e37097ba89f2d36176b1ec675

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MocB5:qmbhXDmjr5MOtEvwDpj5cDtKkQZQSf

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_06921d801d4db673d690ad7735b788a5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections