General

  • Target

    2024-02-28_4735fef505808c9c89023a708d3dd797_cryptolocker

  • Size

    49KB

  • MD5

    4735fef505808c9c89023a708d3dd797

  • SHA1

    436bb09a27ee8c16b18a10197ec46e4e20dc77eb

  • SHA256

    82cd3b4ae9760c83a6a05c6eae773c70e235844e56bb55ff91b1c55ef2010642

  • SHA512

    68e721c99d4423be4ca1e8714a38b89d4e5db2276d07806b8b81224fa970d5e8a14b3ab0769818e6bcf57d46df1246a4eeb685a81c6778a3d709b0040a1da0e4

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB52tk:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6uC

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_4735fef505808c9c89023a708d3dd797_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections