General

  • Target

    2024-02-11_63f5a9a971010873294baef4d72dc50b_cryptolocker

  • Size

    46KB

  • MD5

    63f5a9a971010873294baef4d72dc50b

  • SHA1

    6b7d3e77387a26b62bd4f09e55710789ab2f79d6

  • SHA256

    7f02bdae6afb1800acd84c5e3a4082162b7254a93295bfea6cd265d7d95ab41e

  • SHA512

    4fe67ab8d54242f72f760e05a69a429e567dbaefc181352386b30e92de93c755f4ba8ea6244334ffee4bb55f3c00a67d5a435768416efacad46fdc87d3b657ee

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo2B:qmbhXDmjr5MOtEvwDpj5cDtKkQZQW

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-11_63f5a9a971010873294baef4d72dc50b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections