General

  • Target

    2024-02-12_20dfcebf1eb235f943c2e6d111659da2_cryptolocker

  • Size

    49KB

  • MD5

    20dfcebf1eb235f943c2e6d111659da2

  • SHA1

    d4e64c97d5cd16e360eae8fdce2f92cb3d65421f

  • SHA256

    7f7f437d0b9813a95265a09b860fdee692387391660b803b08c419514bf4e6fc

  • SHA512

    0f36586be5e8344fba6874f88af556d1f7fabd70d5560eac26be9b1c10048c72e46c610153f443ccf1b262d917af0f1aee77d2f5f20cb02459c28fb7c9936fa4

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB52f:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6uf

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_20dfcebf1eb235f943c2e6d111659da2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections