General

  • Target

    2024-02-22_d1a797ae3f39b46eb662df1cc504ae5d_cryptolocker

  • Size

    46KB

  • MD5

    d1a797ae3f39b46eb662df1cc504ae5d

  • SHA1

    540f37e3ad793ddfccb1d06025d6f0259bd59135

  • SHA256

    c33c9d9bf78efc5ed67177702db09391756024e619830b7b4ec33a69b7926837

  • SHA512

    3254681ff6f13536dea60a173a106672ed7a91cf9c9741ec6dc94246e0fb3e9b456e9589a1f1081746c01365309c8e13dd05fcb53ee183382dc6c1825f6e005a

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTBJ8:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6f8

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_d1a797ae3f39b46eb662df1cc504ae5d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections