General

  • Target

    2024-02-23_20f9aa9a02c45527fd8b1c9320904915_cryptolocker

  • Size

    45KB

  • MD5

    20f9aa9a02c45527fd8b1c9320904915

  • SHA1

    d90a26ca0f0810f12799c48bf1e058cba5808747

  • SHA256

    383d2071b1f18f94fa361f099c1e469c2457c632466db3e29f39f264a358ec7b

  • SHA512

    11f8305277e452e38d02f53f444c624761ae4100e163efda872748d698451f453a87ff4c0be5d33d3f40d7e39a528a02c474cae45541596c1f828269ab475e9c

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MobY:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ2

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_20f9aa9a02c45527fd8b1c9320904915_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections