General

  • Target

    2024-02-14_9f4f03acca1c577cf388877598a15828_cryptolocker

  • Size

    45KB

  • MD5

    9f4f03acca1c577cf388877598a15828

  • SHA1

    fb3bd718106b91393f7076b3ec1707b1d157df6d

  • SHA256

    1e9c0b2a446261429d3c29fc68762454ff81f853efbf07ae0d0951d57866f735

  • SHA512

    3a84d91b77148e7833feb71cb05351874c2df1bf62cbb19d2395ba4160ac3ed75fd4ad93767b43127b18d663ba4c486fb58765ae8b7e4ba8bd8dfa4d5cc09b20

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo4gg:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ8

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_9f4f03acca1c577cf388877598a15828_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections