General

  • Target

    2024-02-03_41d0a2900fced2afdec8d43e70ae7a92_cryptolocker

  • Size

    48KB

  • MD5

    41d0a2900fced2afdec8d43e70ae7a92

  • SHA1

    4ea3b75c6d92691844b68aeca8cacdf4d95ebfce

  • SHA256

    2ac9b3e561c8a86da3a1923c6d41c80c5a613f84f5937c0e0dfb0800ebb86c91

  • SHA512

    6664f4099288b818fb2633fea0c10fbdd06dfa0498c0cc1384ad816e916baf32012682f028f56bc9e055b45d95638f48ca8a4e588cb4be98e6457ff7904953f6

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUv1D:BbdDmjr+OtEvwDpjMXQ

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_41d0a2900fced2afdec8d43e70ae7a92_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections