General

  • Target

    2024-02-04_445ae8b214357bdd9ae7099223a9897d_cryptolocker

  • Size

    56KB

  • MD5

    445ae8b214357bdd9ae7099223a9897d

  • SHA1

    1fd5c831781576e7eceac417586e2f811c2f85ec

  • SHA256

    b8b780a1134448aca6ef4b1183ed53a8a0b624814d401b3f92b4a29116ee46fd

  • SHA512

    98b599324905d101c848a5b064c36d73431a59aefcca74446a969b8fd91f5e9d5af6762c64a608036b6a0808edca869502db2c3c6eead79305e5dbc4accb732e

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61W:BbdDmjr+OtEvwDpjMs

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_445ae8b214357bdd9ae7099223a9897d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections