General

  • Target

    2024-03-16_287f4c35b00e0ccd427672b02d610bf7_cryptolocker

  • Size

    45KB

  • MD5

    287f4c35b00e0ccd427672b02d610bf7

  • SHA1

    867d6a58cddfc0c34a65415de0f4a624eba985b9

  • SHA256

    98636129febd7cc3458a95771a7c27fc7c0c053c7cee3d8c5ea3479221cfe304

  • SHA512

    a9e2e130c69f493cdd8faa0ff00f5344b514971b3e14b66fe53e809c1d8bae9a9e6d69bf892adcfa4f82d7248795f696c4c6b9620c5d038221f181837ee44647

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo5:qmbhXDmjr5MOtEvwDpj5cDtKkQZQH

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-16_287f4c35b00e0ccd427672b02d610bf7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections