General

  • Target

    2024-02-12_4175efe021ea01a1c8e3635a59350610_cryptolocker

  • Size

    44KB

  • MD5

    4175efe021ea01a1c8e3635a59350610

  • SHA1

    9404611cb1e5c1a8f544a283a2ec2c9d26849ccd

  • SHA256

    b0cc5c098d4f346211f0b52afd44d22f3675a554ab19dffc2591c76add144e74

  • SHA512

    d3548d258137f95a317badec01f19509eb6b7fa9fdda3619ed73998a92c1d587b1e28e09e754b2e72dccbb8211ae1f5e48510c4fdbf1c39ff3719a33da5ed41a

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05AF+hrY:qmbhXDmjr5MOtEvwDpj5cDtKkQZQx2

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_4175efe021ea01a1c8e3635a59350610_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections