General

  • Target

    2024-01-29_6348d7e31fcf21ca65d69c7f81801269_cryptolocker

  • Size

    57KB

  • MD5

    6348d7e31fcf21ca65d69c7f81801269

  • SHA1

    7eea617b4b5088c796c85fd4781ddbce80314b43

  • SHA256

    6dbbc6372f141d28a44bcb6fc1b1019ea79bf10a7f7e4e18a0d7a56a82bdbd34

  • SHA512

    b4d499c770366d2abfdc2e0183e53c9dafe1da413ae24fdd84248ccf0b625454eaf0da2e94529982086c2365f8ecfefe23762c68e6a7a3b64b082064fb8c361b

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61PT15:BbdDmjr+OtEvwDpjM5

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-29_6348d7e31fcf21ca65d69c7f81801269_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections