General

  • Target

    2024-02-14_d08fd4d881431c4eed30d3ff2cf01fb1_cryptolocker

  • Size

    49KB

  • MD5

    d08fd4d881431c4eed30d3ff2cf01fb1

  • SHA1

    f5baebb246df5cc70e6e818df701ffcf3d617b49

  • SHA256

    de7520ec04ae980b3b33cef56cc26d657f2b72d71a1119d268a132931ea143b7

  • SHA512

    81153287425d910f036dd7c0dd65e19b99261850cf307f30d1ac21ded85c320e13a3fba644e919cbca9069bbb634dbed388af61d4209c703b9225ec5a7664e43

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB52M:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6uM

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_d08fd4d881431c4eed30d3ff2cf01fb1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections