General

  • Target

    2024-03-08_45bf42d80c591961b38057a53a5c7f52_cryptolocker

  • Size

    49KB

  • MD5

    45bf42d80c591961b38057a53a5c7f52

  • SHA1

    217b8ccf3ab7f198886ed709bd5f14ac4b66dbc6

  • SHA256

    c463b7313cc2f51e110cfe2315f666f420ba2903907467cd9dc8c569374a506a

  • SHA512

    cf8d5d05ae051014ca669f73c7c13b285b6d84b0b6dc4b4ad75838bec1b299806dc3804a2ac847a7c144d6f4214ee505cc8e4ce2b3d81b27a6ddf14dce18c91d

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB52ze:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6u6

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-08_45bf42d80c591961b38057a53a5c7f52_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections