General

  • Target

    2024-02-04_26dec15dd7d1594a7e5a05e595e4edf4_cryptolocker

  • Size

    60KB

  • MD5

    26dec15dd7d1594a7e5a05e595e4edf4

  • SHA1

    4686b649d87010dda834ca8aa965eb699ae5cb55

  • SHA256

    342b2f31383104057ee392019e49372de3c53fdfd875aeec0dcb970d4f895a2e

  • SHA512

    ccd4294115f0fca669bfeee8ca7b96ae498c4e9b8c070e8fa17277a6c327b2be7597ae9fda7fb847683001a8d640a3827cca0ae67ee8a29bbc4547ab26049e15

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsR:BbdDmjr+OtEvwDpjM8J

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_26dec15dd7d1594a7e5a05e595e4edf4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections