General

  • Target

    2024-02-21_424a00abae406b5d6ef3dd5357929b55_cryptolocker

  • Size

    47KB

  • MD5

    424a00abae406b5d6ef3dd5357929b55

  • SHA1

    e045c3e83c61687f6bd5f565f228e6e7fed34dd5

  • SHA256

    c5df9b3d059c0354a6b23f2acb1fc3d747c2a135a028f2554c046945e3e0a61f

  • SHA512

    d0821f2fc44394a86b21748d38fe7cf3e395246c559806e32bf6f5646b2f54eb04db3b69116a23683764857538d9f139bc14d1f3f1d25314c968f78388118535

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo22d:qmbhXDmjr5MOtEvwDpj5cDtKkQZQJd

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-21_424a00abae406b5d6ef3dd5357929b55_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections