General

  • Target

    2024-02-28_a5bb90400aa49ed830e7b2dd02af0300_cryptolocker

  • Size

    46KB

  • MD5

    a5bb90400aa49ed830e7b2dd02af0300

  • SHA1

    d831ccba204028d2146aac10d77609d127a6af66

  • SHA256

    ec0166f18b28365881a3bac84d70468ead8a7ec18cee7a8957cd5a03ba6173be

  • SHA512

    8200e40ad4fbf66fc9c5a3778e92d8df6a84043750f54f4498b51c4b9d26d40717c6528db30c4e935eaff8e877d3ecfb0ac4a4f507d2ce36442a9e42860a541d

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Momzt:qmbhXDmjr5MOtEvwDpj5cDtKkQZQqt

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_a5bb90400aa49ed830e7b2dd02af0300_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections