General

  • Target

    2024-02-19_6961bf7f20c741028a58348b799e9865_cryptolocker

  • Size

    45KB

  • MD5

    6961bf7f20c741028a58348b799e9865

  • SHA1

    5b75a39a28421073c49accefd63b82eeca788aba

  • SHA256

    9c9d1a1dbcbcc5dc0a11ee0016c255a49bf8609e5b07d789b3233994cdd5d521

  • SHA512

    26c283dc1ce2a01fdd8561af571ac5ac8ea33941580fcac582b6ea45aae0841bc1d32f2a90073368973aa8662944e8ad310a1175c8d066f4d2300aed33cb809b

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Moc:qmbhXDmjr5MOtEvwDpj5cDtKkQZQO

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_6961bf7f20c741028a58348b799e9865_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections