General

  • Target

    2024-02-28_98671e8b48eb912b7e11960349683755_cryptolocker

  • Size

    45KB

  • MD5

    98671e8b48eb912b7e11960349683755

  • SHA1

    40fc9861e891b428a8f38a9658ed1057a7dc5742

  • SHA256

    04c12b6a9ac09117d2b401782f7fbf3bfcd43cb1e3d161ee768faf74d3677c6b

  • SHA512

    473d31241df3a85244fb943d9d526118e6732f99a6e09c7da73821d77c49c4b04d7a31043e2d695115596d817b50249f7ecfe02817fcdb5138c3a503f94b5a59

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MomzS:qmbhXDmjr5MOtEvwDpj5cDtKkQZQqS

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_98671e8b48eb912b7e11960349683755_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections