General

  • Target

    2024-03-11_40fdce3a40b8ffdf841c6e0fcecd85f9_cryptolocker

  • Size

    28KB

  • MD5

    40fdce3a40b8ffdf841c6e0fcecd85f9

  • SHA1

    b885c5ed5d5bb5eb26caa10b49b65b88e8b2120d

  • SHA256

    f990f2d568cf1165cc0f4ae0526fa97a9d780f9b66fe3e0210f281bf60f9eee1

  • SHA512

    3c04ef64ab43780e1373d02f007e59d231d23cf45a963474d11b4c96dcc68b8d1e4862ad21c9a46e3b70fa88e3a2fbef3df7f1d2ddff72c012a6da99090a8301

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+R:q0zizzOSxMOtEvwDpj/arX

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-11_40fdce3a40b8ffdf841c6e0fcecd85f9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections