General

  • Target

    2024-01-29_b49250427fa074f16a680b924d0bb9e9_cryptolocker

  • Size

    58KB

  • MD5

    b49250427fa074f16a680b924d0bb9e9

  • SHA1

    32cdc84cdadfa01e2941e3f08e0089e89d3c691b

  • SHA256

    8ecca5b6d296f75ec13c847deba026ef1421384253d8c80a4fad7e5b084d20a3

  • SHA512

    501334a5cbe7f740fe1d661239150fecc9b7580c243c19c4920edcb7f616c90456c51284810a0bc304fccba45df0f46a6c7695eb6742fc3e4f17b0fad3d49666

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgZ:BbdDmjr+OtEvwDpjM8Q

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-29_b49250427fa074f16a680b924d0bb9e9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections