General

  • Target

    2024-02-19_84fe52a2ab15da2977c0f9cd3d4bb04f_cryptolocker

  • Size

    44KB

  • MD5

    84fe52a2ab15da2977c0f9cd3d4bb04f

  • SHA1

    e73854fc3f726597144c985a938dee74fc5936fc

  • SHA256

    b19bc0110e842eda45599fba469c58cd5ee15bd56f81ebd61f70ca6cf72bb7d7

  • SHA512

    ae764a8c6cc31af90498032c8bc6ea53aacd2441cd8b8d7331c1d320c97fe67ae139504321b2f67f144cd519fb97612d6e59b0cb3a11bfb23787ee7f4c918fe6

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05Wpb:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ4

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_84fe52a2ab15da2977c0f9cd3d4bb04f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections