General

  • Target

    2024-02-17_13e31e8fdea8f1e3ddd7f2a9edd2fc92_cryptolocker

  • Size

    46KB

  • MD5

    13e31e8fdea8f1e3ddd7f2a9edd2fc92

  • SHA1

    ec42b232a62051422c772f70f049e6f48b180670

  • SHA256

    d8fcd7215b2479b8cab0a6bc189181dc36d04086896cb11f0d6fcc1ec9af361c

  • SHA512

    e3c824910df3ba186cb102a2c207046f346de04e40cff788fae51fbd5f8e9a11ca666356cb4089fac52e29d064a41e889d8a4587a07bc5341293a744031ff992

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MocB4:qmbhXDmjr5MOtEvwDpj5cDtKkQZQSK

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_13e31e8fdea8f1e3ddd7f2a9edd2fc92_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections