General

  • Target

    2024-02-12_823e91a4d85f2683534f372fdbd46e6a_cryptolocker

  • Size

    48KB

  • MD5

    823e91a4d85f2683534f372fdbd46e6a

  • SHA1

    5658ce5634563e555424be9224e09d47c944e236

  • SHA256

    5c479cd81b57cb858ec9825505aca0e7c0943ee9e38a5b53ab93a84bf25b8d6a

  • SHA512

    1d2ae4ce167fcd28c0742c61133d0e2a2e50b22c96f2af757e526f569bc7eb5e6b29c21677f1c3b3383b2a4a34872bfcf4edc0eda250e220444cb864a83f3b14

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB52s:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6us

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_823e91a4d85f2683534f372fdbd46e6a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections