General

  • Target

    2024-02-02_360b36b57ae02893c4ebaedbdda82ec1_cryptolocker

  • Size

    59KB

  • MD5

    360b36b57ae02893c4ebaedbdda82ec1

  • SHA1

    cad0880d209ba64e44a22d6db83c8fd073defa9a

  • SHA256

    b1b7fd7a0b54833a6668516ddcb6e89f04d18082e61f5154e9a8f1a94106348e

  • SHA512

    4dc10ceee6f64d006fd7d6775e4f42df8ee1c153ee23c60879179068af95e79839dd99809380268e52a2fac10680046cabfa4e26151538bf9cdcb14c30b68eaf

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsHz:BbdDmjr+OtEvwDpjM8b

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-02_360b36b57ae02893c4ebaedbdda82ec1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections