General

  • Target

    2024-01-18_14b353371e78f7f96a3fd43f8f48f667_cryptolocker

  • Size

    58KB

  • MD5

    14b353371e78f7f96a3fd43f8f48f667

  • SHA1

    48ad35e9b914b6c2186ec01a8aed56bf7933b589

  • SHA256

    8059a0a1c24758eac550a8e30e3ca713b44a1c29bdf654e26710605a1e8ee18b

  • SHA512

    b12e6f102ceb573b2396c4051b99a61c00e8fb70455194f97ad71af8fc1f6f4da2638048fa4acb5286aead78f8632fab53a01ffd2dd11fd764e1aac96c46069c

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb614G:BbdDmjr+OtEvwDpjMp

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-18_14b353371e78f7f96a3fd43f8f48f667_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections