General

  • Target

    2024-02-01_904f41808e3a7ecb5b2445fa9b966391_cryptolocker

  • Size

    50KB

  • MD5

    904f41808e3a7ecb5b2445fa9b966391

  • SHA1

    1094ccf066c9372913a0caee08bd5b3b1a1533c9

  • SHA256

    24d85474bd2f9c67b0396c9cffa1f9eafb3b7ea1b38c56a044d133bd971c375f

  • SHA512

    7435864a31701e9e1b4062f745337f46b5d47ab723afa0d6aeade2e6c904cdef091247faa78d408ac575a3d57dd55053a9498a8caebde19c0abdaf8a6464059b

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6ImpyEl:BbdDmjr+OtEvwDpjM1

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-01_904f41808e3a7ecb5b2445fa9b966391_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections