General

  • Target

    2024-04-23_faf8c4ff1c049ca273dea590ec8fa929_cryptolocker

  • Size

    46KB

  • MD5

    faf8c4ff1c049ca273dea590ec8fa929

  • SHA1

    d771beac6b158a1e5222513e7ed1fbc7faa687dc

  • SHA256

    b39fffb209c3cd6f874a173a309172cee448b211cfa907a1dbd6687a73b33ea2

  • SHA512

    d004193b081016eb75f2ba0c90c9af93558ffe9afb4aeacc03cd2069d72fbe790773b1b958e976cb5118e27663e96a66838f0e3ebc080c5a136f5e31bdd224f0

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoAU:qmbhXDmjr5MOtEvwDpj5cDtKkQZQd

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_faf8c4ff1c049ca273dea590ec8fa929_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections