General

  • Target

    2024-02-19_1f6e48ae3250332f0596e63cb1eb4aca_cryptolocker

  • Size

    46KB

  • MD5

    1f6e48ae3250332f0596e63cb1eb4aca

  • SHA1

    1a4894de38587c7e3f96137774ade1dd3a1bf266

  • SHA256

    b398b75f022fda0d68ba4cdc0e6c5167dc4e95f6ea97b0af83762fce20cada02

  • SHA512

    b782d8dba7efde418a50e177c9ee8ce0a889646cb21cc4644813cee5afb5e0007daafcf5705d6e70491703be38272ce77d1e1df2f6413183098edd2975f28b2c

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo22K:qmbhXDmjr5MOtEvwDpj5cDtKkQZQJqX

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_1f6e48ae3250332f0596e63cb1eb4aca_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections