General

  • Target

    2024-02-12_d297c1e37f8af32a8e8bb565cb48d191_cryptolocker

  • Size

    46KB

  • MD5

    d297c1e37f8af32a8e8bb565cb48d191

  • SHA1

    363ff5e35cc966e292e1f3046bd891dbf0d13a1a

  • SHA256

    d664996e44246c7eb01a5c04579d693250131b328bb109d7a53cb70383fb1045

  • SHA512

    948de55841e48f4397201197dafbce989b9631a67996ca5687223e95f785884aed28e30d5e511421b706d51a67751781f7caadb90d64876681c8a269390fc1f0

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo2T:qmbhXDmjr5MOtEvwDpj5cDtKkQZQw

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_d297c1e37f8af32a8e8bb565cb48d191_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections