General

  • Target

    2024-02-19_5f3145dcb2ed6a747684279726cbfee8_cryptolocker

  • Size

    47KB

  • MD5

    5f3145dcb2ed6a747684279726cbfee8

  • SHA1

    f453e91d245b7aab7ada8dcb9b2db653f638c220

  • SHA256

    6b19cc89e898a7d8ed999fd8733f56454931f74132c2f3d6aedd8467d9481136

  • SHA512

    8404424c0fc475877629097c3b2a15ea4b39b8f9c4fcbb9879e907817117522aed7830b2dc891be3c5092eabdc8541ac9449ed307a117bbedf4f019b5d6291d2

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo220:qmbhXDmjr5MOtEvwDpj5cDtKkQZQJ0

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_5f3145dcb2ed6a747684279726cbfee8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections