General

  • Target

    2024-02-23_40074f6c2c57160304704c172274f3b9_cryptolocker

  • Size

    47KB

  • MD5

    40074f6c2c57160304704c172274f3b9

  • SHA1

    be1c6aba01a0b939f3b83c42116a01060dadf56d

  • SHA256

    51adb28dba3dec2b0b09e6692433aad35520e8ba3782af15d3e8fba7adaf8789

  • SHA512

    4ec202d7a0f3df33bc10fb5b2937041088f2bf08ce4c24d64983484251f4281cfc85a8384f5f700f0703d6f9f7bb02ee2ed66e31a1bebac24bdc5ea8aaa40602

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mofb:qmbhXDmjr5MOtEvwDpj5cDtKkQZQhb

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_40074f6c2c57160304704c172274f3b9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections