General

  • Target

    2024-02-14_4f96374eb173b701a836b62f99c208e1_cryptolocker

  • Size

    46KB

  • MD5

    4f96374eb173b701a836b62f99c208e1

  • SHA1

    eb619b7f0236ce46f33262369a0b7d53441f2736

  • SHA256

    f85d05555e36dc8bf7d4baeb23715c495056a87b4ed1d7ea1261146e4f1a93df

  • SHA512

    c4ebe7e941a81dd1e8c2fa5614ddd089c18e9589693ff1208fe0ec6fb26a951f3a2ecd48a082ef392869d11c8f9e2533fd8cd17e77b7990fae5be27c0d74b360

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoU:qmbhXDmjr5MOtEvwDpj5cDtKkQZQG

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_4f96374eb173b701a836b62f99c208e1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections