General

  • Target

    2024-02-12_c5f8b3e22e37e6b81c48baff8dd72a82_cryptolocker

  • Size

    46KB

  • MD5

    c5f8b3e22e37e6b81c48baff8dd72a82

  • SHA1

    a774b854c56ba6c566dace8fcf60b79f435dcc14

  • SHA256

    aaf10164f94d0d54e231647abceb10f515f3bf7f30503b9b8ecae738480cc1c3

  • SHA512

    418fc3512c8b6bf5a958153e42d53f53c0f2c606bc51e086500bf4beb872ece80dc74a6cdfe9daa3ef6e90bb4c93837e838fd351ba436f70b2f2eadbbd9ecd66

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo22U:qmbhXDmjr5MOtEvwDpj5cDtKkQZQJU

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_c5f8b3e22e37e6b81c48baff8dd72a82_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections