General

  • Target

    2024-02-18_68c4e1b46a1127dcb7889991a8a80d5f_cryptolocker

  • Size

    47KB

  • MD5

    68c4e1b46a1127dcb7889991a8a80d5f

  • SHA1

    7f14556ff7f842ed2c3fa3e73bb87ffe542a2249

  • SHA256

    149f46624c3acf86f551f75a94c70782bad68b001ea231894f260fab944996ad

  • SHA512

    7d3b7d22deb4aa94cd7eab9cdafb694d15fac0515cd4c505f4fad3df208f1391742d9c87e62af6aa5c90511317f870f01e3ed207c13a9acb19db550f9b2c4337

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MofTB:qmbhXDmjr5MOtEvwDpj5cDtKkQZQhd

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_68c4e1b46a1127dcb7889991a8a80d5f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections