General

  • Target

    2024-02-28_a210addd9b1fe2b09567c0e33ec344b9_cryptolocker

  • Size

    46KB

  • MD5

    a210addd9b1fe2b09567c0e33ec344b9

  • SHA1

    8cffe602ed77e6c98fd9c1b3d58d25343bbc00e7

  • SHA256

    102671289f49d1bd6529872734f2346f04361e3532f0efa79fb7b9b282db3c4a

  • SHA512

    56e47258a6be1c665e2308f32b295fcc058742c49aa617fa82c8e21e182a870db51f28f92dbde23eb2e479d392a48257467c5cb9ed494ce64c257161589123e8

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mob3:qmbhXDmjr5MOtEvwDpj5cDtKkQZQV

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_a210addd9b1fe2b09567c0e33ec344b9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections