General

  • Target

    2024-02-17_769dc4dabc214e4adf7634b4c6183260_cryptolocker

  • Size

    35KB

  • MD5

    769dc4dabc214e4adf7634b4c6183260

  • SHA1

    18527b587e05d20933a9b332cb05560a7e6e1edf

  • SHA256

    6bebe992370943a79bf41817786f64878d4a63287f3a8d670e983e1153b74f09

  • SHA512

    7f52d5eb164eacba76ed6209025d5a89f8ba0a63e52e31e20a42ef80e62052c35d5cae02b61f872ba95ea7555adb245f5367dc61e25983333603db607e27b08b

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmotzI6og:qmbhXDmjr5MOtEvwDpj5cDtz7

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_769dc4dabc214e4adf7634b4c6183260_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections