General

  • Target

    2024-02-19_650cd423fd2229447d15015baf8778ba_cryptolocker

  • Size

    46KB

  • MD5

    650cd423fd2229447d15015baf8778ba

  • SHA1

    486271d994d8f6a060cfa90f985c0eae0be31fe6

  • SHA256

    f48850e4afee5e90e241e49f2ea7a3637d36b80bc6c5e0adbc97651c52c7e4b1

  • SHA512

    3536981b4479010c211ec8f74a502e7a1b69d08d712a991a696908f69bbcf10ef76fd3d1c0ea44763acf0158c2653618a16ba788ad3df89a8060b3685009e147

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo2p/:qmbhXDmjr5MOtEvwDpj5cDtKkQZQG

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_650cd423fd2229447d15015baf8778ba_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections