General

  • Target

    2024-03-13_e366238d2b470a0890ef56d279c8cd32_cryptolocker

  • Size

    45KB

  • MD5

    e366238d2b470a0890ef56d279c8cd32

  • SHA1

    fcc45e4f0c898b65e779beb9101315fcdf2b0326

  • SHA256

    40411b5da122582c99febdfed3e728df93778b810cda20b7cdf4b38329ce998f

  • SHA512

    bfc8601a7a4027024b6183ad2f10a67d31fca7bf9f3db4a785e1d8a0de6f7579a2b0513a457c07c6bd78d78347b64b497cf7532be39c1afb05cb2378dd6e6c8b

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Momf:qmbhXDmjr5MOtEvwDpj5cDtKkQZQE

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-13_e366238d2b470a0890ef56d279c8cd32_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections