General

  • Target

    2024-03-13_6f6ee89fc171d4ce7a61b4dbeee4e344_cryptolocker

  • Size

    47KB

  • MD5

    6f6ee89fc171d4ce7a61b4dbeee4e344

  • SHA1

    44aef09daddeef4ec8b0ccc771b966691bee7c99

  • SHA256

    a67f70fac91e73be30e0384d29f07d750200e8ad488a9c462c6508105fd23cb4

  • SHA512

    3c93f79472b1539060fb7f636dd8b8f6363200dab029bc2072a9c8335f7dd306f5140ae2a20f735f926719d907b09eabb8c15cdc71f0cb993ef34091e8a30ab6

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo2pF:qmbhXDmjr5MOtEvwDpj5cDtKkQZQj0

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-13_6f6ee89fc171d4ce7a61b4dbeee4e344_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections