General

  • Target

    2024-01-18_a23a26ec9c1e39b702d71c0f7964e140_cryptolocker

  • Size

    48KB

  • MD5

    a23a26ec9c1e39b702d71c0f7964e140

  • SHA1

    7f5a4cd785a0786288111450deaf90ca3353b2a7

  • SHA256

    37ec923f0307ba98b45426a764fda5dc66077f5f35f9b9a46f1d998e7c753530

  • SHA512

    6fb198b6210478c97c1e7cb2528eb6379433dcd40a0f643d37db89eab7293982e1f041a8412d8085610d634b22eeca46f84ae640c4299b5eacbafeb2f674d114

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6Lv6h:BbdDmjr+OtEvwDpjMK

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-18_a23a26ec9c1e39b702d71c0f7964e140_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections