General

  • Target

    2024-02-19_74def8e84baada7fa8a9e837f5ee126f_cryptolocker

  • Size

    46KB

  • MD5

    74def8e84baada7fa8a9e837f5ee126f

  • SHA1

    d8da7539309c9d3bad10157871559b312b49c286

  • SHA256

    56310acfe74427deb81b796517529852a1603f3419e991a793ad34eb78388954

  • SHA512

    7e48c22fb13984257e8e6770c5d3250320be1cbf0beba96703d0498e259ed74f4154802132f616e1161ccffb3d20b78a0090bfaf42f568a67f34fee5c24b0dd6

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo22U:qmbhXDmjr5MOtEvwDpj5cDtKkQZQJU

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_74def8e84baada7fa8a9e837f5ee126f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections