General

  • Target

    2024-02-11_914b07e5af2d8572cfb17dd82198128c_cryptolocker

  • Size

    44KB

  • MD5

    914b07e5af2d8572cfb17dd82198128c

  • SHA1

    2a02ec34a4bb8a48c4364689803a290cfdca1da9

  • SHA256

    2d8f30d4e5f76f127f57b3a17469f51086c23ae7575cb0907d71306b4eaef356

  • SHA512

    7fd875c05f9c5251c99efa7aadaf553d389b0dc3c41f9ed27d6c666ccf200b551226aff33e71ce725c77ed5d87387bdd7dfe7b25d770ac317ace01398fd8a711

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoB:qmbhXDmjr5MOtEvwDpj5cDtKkQZQv

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-11_914b07e5af2d8572cfb17dd82198128c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections