General

  • Target

    2024-02-22_e849af3284d4290230d468a9973c10c3_cryptolocker

  • Size

    48KB

  • MD5

    e849af3284d4290230d468a9973c10c3

  • SHA1

    4e908d4d08237142505289d981118ff7cbcbeea8

  • SHA256

    41e21d3b56421dac667b100f581ea9883232684fa90725156f4c76555b692ee5

  • SHA512

    144d89c4ac2b812c9c79618e97cbb3642d49f3fb0e43190a9b610d9cc279b4ca5494b3fe63e9137d28610ba6ec0650c516839ab217c0262e76b24731108a18f7

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB52zz:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6uv

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_e849af3284d4290230d468a9973c10c3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections