General

  • Target

    2024-02-13_6d08c90b448acbcfd96d1067d7eeec9f_cryptolocker

  • Size

    48KB

  • MD5

    6d08c90b448acbcfd96d1067d7eeec9f

  • SHA1

    ca79d3ecbf065e49ff68c3abc65e6c03c163ac7e

  • SHA256

    f75a9bf10e5263e58902aa59324dfd06bca656f15d8e0064e813139de692a1a0

  • SHA512

    9884b0fd386af27c2e6a41c2fc5998c1a3dd0d5c4fb1ae5b066d8d966ecc86e41d0845e50d3c2cb18246d7f6310317a57f58909c468b38abb928140bfc3e4d76

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB522:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6u2

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_6d08c90b448acbcfd96d1067d7eeec9f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections