General

  • Target

    2024-02-23_8d3b5da9f7f3da6d3b0d38bb94ed1fe3_cryptolocker

  • Size

    49KB

  • MD5

    8d3b5da9f7f3da6d3b0d38bb94ed1fe3

  • SHA1

    8e238b6c992b0ad2eb39dfaa633e3d2e0a007e2d

  • SHA256

    b2370bef1dfca9aa20fdf966c9eb72f5c3f690d6c834ff2afba36ac5627fdee5

  • SHA512

    4a6a6dd9adfc2705387797da2f2962b5b6a71ad1476be6bb3b36084f396bf661d1dcc61246fe9999c0a5b5a4e1476295a5e195b000fe6811fb66cdc031e5e3c2

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB52L:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6uL

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_8d3b5da9f7f3da6d3b0d38bb94ed1fe3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections