General

  • Target

    2024-03-11_8a0802ed13595cc9dc4639d022ecf924_cryptolocker

  • Size

    48KB

  • MD5

    8a0802ed13595cc9dc4639d022ecf924

  • SHA1

    080eb5ae016ced90276bd7d7ae7e5beaab3a6516

  • SHA256

    69f240b6f634b3891067a6b9807725fdc294c4e38b9b1e9c741b941c2665b441

  • SHA512

    0a1ebcf059382830087a99fea35ae1ba245159262aed50f75fbeaf9aba7cb8a2ffc8f59de4c8dc1e2153313538ec3cfba0160f1cb15b50aa571e7c364220f6b3

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo22N:qmbhXDmjr5MOtEvwDpj5cDtKkQZQJN

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-11_8a0802ed13595cc9dc4639d022ecf924_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections