General

  • Target

    2024-02-23_59ba282c7e09c1d718e7f2798ba85fb8_cryptolocker

  • Size

    45KB

  • MD5

    59ba282c7e09c1d718e7f2798ba85fb8

  • SHA1

    6024f637668d71bc1269eefe3c137e9b5ae899c3

  • SHA256

    dd1f5b1a83f51a23f359f8e5799ce8cc198859c6ec14cab50fb331b0352fc5ef

  • SHA512

    0738efa3c83c4c9ff0f105f3985a69c510ab848f0a62b69d7f70e110c2fdf250d4c0d8ae1d41d5316ac029ceabe7e4b701acc1f14983361abcbdf15de4ac1c5d

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05AF+h37:qmbhXDmjr5MOtEvwDpj5cDtKkQZQxd

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_59ba282c7e09c1d718e7f2798ba85fb8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections