General

  • Target

    2024-02-28_34645f5e2ae7efee63956a76523f8217_cryptolocker

  • Size

    46KB

  • MD5

    34645f5e2ae7efee63956a76523f8217

  • SHA1

    bcaafdf42fcd979142a6c222da54c3fbbab8bc66

  • SHA256

    389f3ef5bcc74fcb870c14b696f88191e5e5c8d5acdbbc59eca78642fa84e595

  • SHA512

    eb3b6a928e735bc829e3e131be9caaee715114059e90af0894b8ecd77a4fc3e04b849fffcf029f67c55a7c98e780789f00a244da4b7295673baa3fdb4cab479b

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mobn:qmbhXDmjr5MOtEvwDpj5cDtKkQZQV

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_34645f5e2ae7efee63956a76523f8217_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections