General

  • Target

    2024-02-17_ef880b1301b9fd69b23852d1ea6c37b7_cryptolocker

  • Size

    49KB

  • MD5

    ef880b1301b9fd69b23852d1ea6c37b7

  • SHA1

    758c215838a183b968623f283051fe34e675bf03

  • SHA256

    f0d76293a9f0a057e380b0fe0a193de66768e0fc9314cd656003a3a5c64cff81

  • SHA512

    a6e15996a3e2a1fb238942545ed5872c8d9bca19d4d65a60f8d95d1a95b9aeaaea5980ae31616268b86a8dd4aaabc019790994d2d8ac1805e70d636bd58f6742

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB52p:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6up

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_ef880b1301b9fd69b23852d1ea6c37b7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections