General

  • Target

    2024-02-17_5a6c3ccc806868d0227fa5d1498f7bed_cryptolocker

  • Size

    46KB

  • MD5

    5a6c3ccc806868d0227fa5d1498f7bed

  • SHA1

    25f4699289c022f084b55f45695a420514c434c1

  • SHA256

    a51791d90e4c37d5cccd7b60a11ed962bfc820b035362c09746a4e89f805d4be

  • SHA512

    9cd4083204a36a26a7140066fa7bca9f395a6fb330eeca6e2498c976e1c399a752dbfc5eacaf12ea2185f9514bbc92eca40207c6a28eba29c6ea4318c27ea2ee

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo2pP:qmbhXDmjr5MOtEvwDpj5cDtKkQZQe

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_5a6c3ccc806868d0227fa5d1498f7bed_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections