General

  • Target

    2024-02-20_3729d71525e20c40bf24b3ccbe8ed6ee_cryptolocker

  • Size

    46KB

  • MD5

    3729d71525e20c40bf24b3ccbe8ed6ee

  • SHA1

    bbbf5fc13d0c583b601e5934fdccebf6cd43617d

  • SHA256

    18fa7c5956db0f8baed10bc580385cb946b7f5979d952b585b319e6566e048a3

  • SHA512

    4214ff06d2b9d25600808766983a144d0c988e7e05b000c99cbc40cd5cf5d6efe6ce0dde27063579a21b1293c9cd24127fc784731244a989854e7e22f3188f2c

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoN:qmbhXDmjr5MOtEvwDpj5cDtKkQZQz

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_3729d71525e20c40bf24b3ccbe8ed6ee_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections