General

  • Target

    2024-02-23_200a929909c3a484cd45ab6a2457f293_cryptolocker

  • Size

    45KB

  • MD5

    200a929909c3a484cd45ab6a2457f293

  • SHA1

    bebc49eb1fd954405b55fce25ae8c5271da9a765

  • SHA256

    c924ee0759945c1dbfa3bddba0ba9fc6277d4ae9590045fc0febf4ccc313ec4e

  • SHA512

    bfd22d1ad1b3e1fcef15bbe8a958e6c19fbd4dd33c3502ff3bde3670fffd51bc9ed511e42ab68b188c895d3c50bcd0949690307df42805405c3572284514b795

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mob2:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ4

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_200a929909c3a484cd45ab6a2457f293_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections