General

  • Target

    2024-02-20_2b4fc3781941c89051d5df853b91eedc_cryptolocker

  • Size

    47KB

  • MD5

    2b4fc3781941c89051d5df853b91eedc

  • SHA1

    4aeeffbec4c55462d0b042648256b6b0b4b65c0a

  • SHA256

    71663acca4145d33bfb5ddc17cac8cd26d6915dca014479f32560349849a470e

  • SHA512

    ea45eb9d2ad634b917b477edd289d04fd6dce32eb727d09e26a9176bd7acb529f7ada0e01bddaa7e0de78f435abf506aa438e5250b0687f065cee49e0352e8bb

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mofz:qmbhXDmjr5MOtEvwDpj5cDtKkQZQhz

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_2b4fc3781941c89051d5df853b91eedc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections