General

  • Target

    2024-01-22_7e4c4c6727879776f3bbfd51c24f6933_cryptolocker

  • Size

    60KB

  • MD5

    7e4c4c6727879776f3bbfd51c24f6933

  • SHA1

    374cfadc22f279d922803c9437458d4deba9b52c

  • SHA256

    0b8968659eabbb42a07dcb092fbad152acdfdd8db04469dc1481d0bca15251a0

  • SHA512

    f9106cee6b2b5e89603be214248e4191b2afb883ee23b50d47711cdb54acd341bc521fb879a18aefed6c8e98f7b5dad9d5b42ef22f9d8cf4e8120299713c141a

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsD:BbdDmjr+OtEvwDpjM8r

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-22_7e4c4c6727879776f3bbfd51c24f6933_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections