General

  • Target

    2024-01-23_6c07d294ef9a8a7a2a73fb98690b323f_cryptolocker

  • Size

    49KB

  • MD5

    6c07d294ef9a8a7a2a73fb98690b323f

  • SHA1

    eef1ed39d2b9cc4081ec99bccdf78c416b700144

  • SHA256

    3d186e6a5d1e24edba6da8bb5dfa50b78b0ea7811f9f98b1c2c7a649dfd18a47

  • SHA512

    28bd64b4186dcfdf08d11c22a8d24895a6dcaf306c0e344dd83c38eab634ac9d545973609305355254c7309bc2a82553b6c7d0aeb3d0776e6252bbf6adf75ae3

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6ImpyD:BbdDmjr+OtEvwDpjMQ

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-23_6c07d294ef9a8a7a2a73fb98690b323f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections