General

  • Target

    2024-02-22_4434426bce9af265c8ded40f0ac1fbfa_cryptolocker

  • Size

    46KB

  • MD5

    4434426bce9af265c8ded40f0ac1fbfa

  • SHA1

    9a0fea70bbfbd6eee54a732dc729a362cb16cd74

  • SHA256

    0ae0d27df34cae464821dd322eb3150e5f07a27bb985ff36f72d2cbb7dde02f8

  • SHA512

    8ea82dc4a0d68c59b5642879d3eae44067947f8ef117b7dbe3f3ae5484e626ba4f719a06cb256a2a4c51f9c09819a9e0941e83c38f4886b7d963daf96cf409d9

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo2ph:qmbhXDmjr5MOtEvwDpj5cDtKkQZQs

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_4434426bce9af265c8ded40f0ac1fbfa_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections