General

  • Target

    2024-02-20_fd24a06290a91015439b54ea000c96d5_cryptolocker

  • Size

    44KB

  • MD5

    fd24a06290a91015439b54ea000c96d5

  • SHA1

    2f5993d5c0f2f4cefa34d930101413e22b108396

  • SHA256

    270d5c461c4d1b5cdd53a8a8e21b47a7c9345dd5b048cafdae15ed1eabc08f32

  • SHA512

    d7ec5f2e4436c2267032be3f5b32e2825ab50cbc5553a511ceefeca65a4334d6d84cc5fe7eddae1a0f07f4d72cf9f303f7ede107d52e79b1f7185cdd2886559d

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05AF+h3U:qmbhXDmjr5MOtEvwDpj5cDtKkQZQxO

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_fd24a06290a91015439b54ea000c96d5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections