General

  • Target

    2024-02-20_d2f1d1134b12b4e4dc3f4f53dd8f57d4_cryptolocker

  • Size

    46KB

  • MD5

    d2f1d1134b12b4e4dc3f4f53dd8f57d4

  • SHA1

    645f779eaa0dc2d4ec927cb087fa776d027e24b9

  • SHA256

    09c2b731640e40fd590b06c3b4829cb9492d650f7385e06752c4d40e892ee005

  • SHA512

    83c80c2e0b08cb1bbda067f18e699cbe1a0cc739ce1c356bfb86e6eedcfd34dd8789415bfffca2d0986adc11a7e31f05b177159719c27990c80f4ec77293eb2f

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoLZ:qmbhXDmjr5MOtEvwDpj5cDtKkQZQj

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_d2f1d1134b12b4e4dc3f4f53dd8f57d4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections