General

  • Target

    2024-02-12_8f8e6b5f9a44946a945f9a93ff1b8a69_cryptolocker

  • Size

    46KB

  • MD5

    8f8e6b5f9a44946a945f9a93ff1b8a69

  • SHA1

    6ec19bc37bc922e75b19b828ded57df13857b832

  • SHA256

    e453a70936aff99830dccd72ee70083dfc33482c50c70414129905fe37ff43f5

  • SHA512

    8ce0d9054a871ce677b3f9dd8a8496be25842da5f4547af31092b2ce7104d80608f0bf7ac9a7dfcdec5b416f2303eef600dfeb30a9760f597a3a7c00ef4402f7

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Moo9F:qmbhXDmjr5MOtEvwDpj5cDtKkQZQS9xD

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_8f8e6b5f9a44946a945f9a93ff1b8a69_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections