General

  • Target

    2024-02-17_b7d20af98ae8764e2aa71c4d1d9b5971_cryptolocker

  • Size

    45KB

  • MD5

    b7d20af98ae8764e2aa71c4d1d9b5971

  • SHA1

    c68bceeaf35a7adb11d4f81124ccd232c088fd04

  • SHA256

    559cbef2dbb4f27d2ee9009566f49ae0de1792a615da683d648efe054c4ab562

  • SHA512

    302e026cf3a27d7c5e34895fb8aa7af8ced04f2007fd30b2f4caf1d28f8108abb02abb8983c1473f74eddbb707c4f14484fff6ecd60db3f3caf1b588987c3ea0

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MocBh:qmbhXDmjr5MOtEvwDpj5cDtKkQZQS3

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_b7d20af98ae8764e2aa71c4d1d9b5971_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections