General

  • Target

    2024-02-12_12b43757747b8691871364bd96848e87_cryptolocker

  • Size

    45KB

  • MD5

    12b43757747b8691871364bd96848e87

  • SHA1

    9d917b4faddf76dd90c640d0cc87d1eb7b5fb8a2

  • SHA256

    e0b2672b3ef8f764eac733dc954b42ee18b3deb02fe3e50cd96c2c0c4b94d891

  • SHA512

    10c1841c6ba95d580d108fe48c307969331f699d67965cb07d2498ad805656afddba5912e178809579e4b4fafc873ca14734d138b9463d5496e29a85303a7e5a

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Momg:qmbhXDmjr5MOtEvwDpj5cDtKkQZQj

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_12b43757747b8691871364bd96848e87_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections