General

  • Target

    2024-02-20_236dd291a77814c938a78bc2aa749c27_cryptolocker

  • Size

    46KB

  • MD5

    236dd291a77814c938a78bc2aa749c27

  • SHA1

    64cfbecb0bcc85152b27031ca7e99555a581da70

  • SHA256

    ebc4002eefb44a951d21b56361d39feb4fc58d03d18aeb715ba667707cb873b0

  • SHA512

    3321a177116f812cbe6e6156df6359df250648c1534e5baef41694974b1d6ca571eda7ac9422808015cbfa5cbab326be4878646b875610b2ddf659ac0f16b742

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoLe:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ4

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_236dd291a77814c938a78bc2aa749c27_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections