General

  • Target

    2024-01-28_36bb4f7bfbb05d60a42f0d8d4a81a2a7_cryptolocker

  • Size

    59KB

  • MD5

    36bb4f7bfbb05d60a42f0d8d4a81a2a7

  • SHA1

    3ebd2f39d9dd6e4dbb6607aa51305eb750491b92

  • SHA256

    224dd888c9425491c04b1dc90b728cbf06659481b218862b71284004330e3a49

  • SHA512

    ec0b42c469c4ba27a6ac9a1512fe451a4007147c20382ed3a73b9171917b247a21eb85f9d54ec13a6d16bcd27b108ae12b2d08895e69796278321cda51b2ea36

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgts4:BbdDmjr+OtEvwDpjM8w

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-28_36bb4f7bfbb05d60a42f0d8d4a81a2a7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections