General

  • Target

    2024-02-23_39d9e1cfb21853ac603ac267c658053e_cryptolocker

  • Size

    46KB

  • MD5

    39d9e1cfb21853ac603ac267c658053e

  • SHA1

    5a56c2039e50e54dd37b27220a5735673b0bc15a

  • SHA256

    331289c833db007bca48c831159c01fa6fbd5ad9a635aaa1344fa5416108f964

  • SHA512

    e037f663bfadb050c499d96e9941d6d9156c43c11913da12cc43ff35572043d841692f0fc29de2cd2e95becb5f50b52f9323dc7bfbcb4516cb78ca7b00394f6c

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo4g:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ5

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_39d9e1cfb21853ac603ac267c658053e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections