General

  • Target

    2024-02-17_5623d453f740e87f2e19c5b8b63c3631_cryptolocker

  • Size

    49KB

  • MD5

    5623d453f740e87f2e19c5b8b63c3631

  • SHA1

    c212bb6572fe90a87c246e1ca91db469004628de

  • SHA256

    cae478e78fd772bd8f24016530ab01f8774e6c686d4c37ce81022a67aad3c58a

  • SHA512

    c4f8b798f4e4c9e09e1e738f809bcefdb4220d9799eeee96c2236d5a0fe6f5488ffe7da92fa6ecb1ccd3d671f678635c083e4a1754fdff0acb2e94f9ca916683

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB52Y:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6uY

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_5623d453f740e87f2e19c5b8b63c3631_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections