General

  • Target

    2024-02-12_420ed5274055c50d62a4e522365afe5a_cryptolocker

  • Size

    44KB

  • MD5

    420ed5274055c50d62a4e522365afe5a

  • SHA1

    bf36f497ea34aa14b0cd36272cc609a227f03b30

  • SHA256

    be14d775fbc0b4eb4b22b024b3f71366673138b03b2cd4286e22368fbc9d1465

  • SHA512

    9ba27e061a956206476bca8e4b834be4936febf646a6333e9854a99163c7e0d327986148747df66d6d1f9e0a51e8eb757471d8cdf11c319458db725e496903da

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05AF+l:qmbhXDmjr5MOtEvwDpj5cDtKkQZQxl

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_420ed5274055c50d62a4e522365afe5a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections