General

  • Target

    2024-02-14_26ada75c5feb7a4b2f6581814c65b500_cryptolocker

  • Size

    48KB

  • MD5

    26ada75c5feb7a4b2f6581814c65b500

  • SHA1

    3f31c3c72fa8e7419f5f099f36ff17da9405e390

  • SHA256

    a83d220d47d065486660023a620203b05f1a1b78f620797f0250cdb6b6598d9f

  • SHA512

    480d56dbe4ab90546865aacdcba1931ae5ec4137ca75ff3c2499d9f8482b5d69f326fd58f7f024156ee159adc27a52b4d922f70bb9270c97bae08f4ae8c134a4

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB52zE:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6uI

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_26ada75c5feb7a4b2f6581814c65b500_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections