General

  • Target

    2024-02-24_f6ec669f4edc1bfcb2f7027478a06159_cryptolocker

  • Size

    45KB

  • MD5

    f6ec669f4edc1bfcb2f7027478a06159

  • SHA1

    285c2393535452122a01871abd23a71d8dbe3318

  • SHA256

    1379e7c22fc47f94cb467175d25805e58ba33dd21e2874b5fcc744ac5446291e

  • SHA512

    b8b2f23b778ddcb72625564c07e616b20e7ef69ce8dd9d8c343c6f701b4479b9243e467a4ad760b5b7e0c2e232dbec72d33c0530a61f0ae0be07c11e69f74d41

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Momzi:qmbhXDmjr5MOtEvwDpj5cDtKkQZQqi

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_f6ec669f4edc1bfcb2f7027478a06159_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections