General

  • Target

    2024-02-20_d0a804d6a95de56298b531892ae27459_cryptolocker

  • Size

    45KB

  • MD5

    d0a804d6a95de56298b531892ae27459

  • SHA1

    defdeda9514c91906bd1180003f0824e00b7be1b

  • SHA256

    1739050628a14c505a12a5e59f62f7b9358c41cc00d0f7e99d1652bbbdd626e9

  • SHA512

    7fd55b5254afc264fdf7b1e301cca29b7d57ae20c5d487bec049ce344819307657f30777e459450d3141c600c4bb7ff0fb06820cd1d546d09e780808c7687933

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mobo:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ2

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_d0a804d6a95de56298b531892ae27459_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections