General

  • Target

    2024-02-28_74165336293e9062da1bd425e33eac69_cryptolocker

  • Size

    49KB

  • MD5

    74165336293e9062da1bd425e33eac69

  • SHA1

    538ef3602f107dce7688a76e540b39e16f171769

  • SHA256

    24b8232566f5ff90e1bc712a872d680369c3896d2195714460d790bd3932b167

  • SHA512

    b911e3bfc68223845b7fd10dcf9abe655ee9f06758cc7dd155021d70dea429ac8a768bc63eaef6cd2cb2f866c818c534f102dd0f4c7737fc03f096759c971ecb

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB52c:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6uc

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_74165336293e9062da1bd425e33eac69_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections