General

  • Target

    2024-02-17_3ad5b4ad14ba5501136d46b0140d7a8b_cryptolocker

  • Size

    44KB

  • MD5

    3ad5b4ad14ba5501136d46b0140d7a8b

  • SHA1

    bcf8e8ea37370d9e195e25793eeb4adaba5e3be5

  • SHA256

    db9f36152d5ecbee01cf6b8e6039d6cb9fda12e03a409ea2613266d337ab50fa

  • SHA512

    5288ae03a60e8c7a8dee5fdbbc203c55aff9c555af1c1169032792cd803ffb615731bb9cffd61387faa136f17a7f6926f3be36d5e5b0b4371e1af289db05b4df

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05AF+ht:qmbhXDmjr5MOtEvwDpj5cDtKkQZQxL

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_3ad5b4ad14ba5501136d46b0140d7a8b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections