General

  • Target

    2024-02-25_de6dd259adc0e8558f959c17f725ea49_cryptolocker

  • Size

    47KB

  • MD5

    de6dd259adc0e8558f959c17f725ea49

  • SHA1

    a5a18183bd1505c2b4793f708e45c872bd672aa5

  • SHA256

    8eb6d58d8bb8beb1f8f257bf8a9bdc8e390cdf46355958ec9e1f742fe35299e7

  • SHA512

    b52600a4c499de39f33f6f0af38d8f99c5bab3d31040a0aa8c01ca7b4f62f521000d90216068d2d84bf33ece188874b5007c0f6b7125ccf624aba2213b176f54

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoR:qmbhXDmjr5MOtEvwDpj5cDtKkQZQP

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-25_de6dd259adc0e8558f959c17f725ea49_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections