General

  • Target

    2024-02-18_725ca5650026ee69f34e2a1457a8e097_cryptolocker

  • Size

    48KB

  • MD5

    725ca5650026ee69f34e2a1457a8e097

  • SHA1

    f97517c9c2e0a5061f692ea903268190fefdbfb6

  • SHA256

    c4b3e7e0026a7971d00a2efe0cc59432bbd77215afd6bf42e64070682770de19

  • SHA512

    136ebc7703614686372b8e863742f122d9b6cfad4f1a1935f7339c43eb5194aeb4474e2d76e2b73f9d3f804309e38f2c83bce583bdee2ba1dd22cae4eb5949ae

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB52rf:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6urf

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_725ca5650026ee69f34e2a1457a8e097_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections