General

  • Target

    2024-01-29_4bb31e66b2090144fd59afa729f51600_cryptolocker

  • Size

    48KB

  • MD5

    4bb31e66b2090144fd59afa729f51600

  • SHA1

    a501c51580493318855cf35ce4ab9acc7adb7227

  • SHA256

    e026e802898524a54ac5aa401225813eed556e36100cc57b36a64b77ebacaccd

  • SHA512

    3ac87db65d2c95651786a5f68b17ddb4088af744eb4c09b18992cc806e572a7e733b8092dc47edcefeef6bb6f8edd1f55d4f3bb27d26e4c9cd09f71e68e06030

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6Impw:BbdDmjr+OtEvwDpjMu

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-29_4bb31e66b2090144fd59afa729f51600_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections