General

  • Target

    2024-02-17_1320d70aaed3ca75ba7ca44aedcb0fca_cryptolocker

  • Size

    45KB

  • MD5

    1320d70aaed3ca75ba7ca44aedcb0fca

  • SHA1

    3adc536a3395dc894c422666d5045cd19ab69827

  • SHA256

    9af90ac880e2b56961e507f5bac4a30f2178868c5d94af98576a674dafac27c2

  • SHA512

    0c6ffcd234d6c9ff73f50dd5c90ab5abaae8c4e634a2b6a342b47b860b2f703c4cf18dc07452c6076670b039a067adad7623bda752354acaae71b2f2458c1a61

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTBO:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6U

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_1320d70aaed3ca75ba7ca44aedcb0fca_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections