General

  • Target

    2024-02-17_8d0189b9ea2b5740fefb45b711c7f300_cryptolocker

  • Size

    44KB

  • MD5

    8d0189b9ea2b5740fefb45b711c7f300

  • SHA1

    a7102da12a2c00122d6e89fab8b29eeed51d4053

  • SHA256

    f3eb7154981a7e59ecfc7da98ae42f83ca42990fa99a7086c4c682f58b8cf95c

  • SHA512

    e21932b9f92898e6b94baa661615400251af402919c9cd4e97ab665a101f7af15f0876862a74e2ca784a6e1540f5bbb3598096d2615cc4f8eb9cfd3dba6100c2

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05AF+hN:qmbhXDmjr5MOtEvwDpj5cDtKkQZQx7

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_8d0189b9ea2b5740fefb45b711c7f300_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections