General

  • Target

    2024-02-28_255b506cd6a80688363eb82b3922cb04_cryptolocker

  • Size

    49KB

  • MD5

    255b506cd6a80688363eb82b3922cb04

  • SHA1

    884b2268924f4d8749e042b6a683d09b954d5238

  • SHA256

    ccefb586fbedf53145a682f4f9069b07fca25a17a3d5d3e0fff3ecbd33bf7f8d

  • SHA512

    1df3f1c187b1e375669ca3630c2293e5d1c438e5c1d3829938873a69f89a0f084594bf752220ae50ec605dd206fbe1e6a2fcb8803ac10c4684290d14888e971c

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB52C:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6uC

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_255b506cd6a80688363eb82b3922cb04_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections