General

  • Target

    2024-02-18_8b0b43bf8d1ec82d27b67dff40d3b662_cryptolocker

  • Size

    44KB

  • MD5

    8b0b43bf8d1ec82d27b67dff40d3b662

  • SHA1

    4dc61b95e5e2f6c1860938cfd6f5f51755162629

  • SHA256

    d08735e9df26d1d64f7147b9cf822eb02e4e8ed5dded61b0c6a75906e896e9d6

  • SHA512

    39dd24e67d17a663263fedd6d7cba111812f6e49df205a7be040844ae19aa5c6a285de16e4995e12cad8d9e6f6ebe23b64af53068161acae76c174903ee20f60

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05AF+/:qmbhXDmjr5MOtEvwDpj5cDtKkQZQx/

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_8b0b43bf8d1ec82d27b67dff40d3b662_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections