General

  • Target

    2024-02-04_66365f562a17e687b35c938023231b33_cryptolocker

  • Size

    48KB

  • MD5

    66365f562a17e687b35c938023231b33

  • SHA1

    60d6694501d9de05cd78eaddfe58001f38702886

  • SHA256

    65c6e1267b1425e07ecd72f98b5387e1e4e2dd97b6c2a9624d43013e15aacdd5

  • SHA512

    ab950b51cb53306daa284451cfa883378302bde551425b12abb223c450efcc6df2e83525ac9581d3f8b7f2cac1fadd0493b18af60e4ca341872bce2b5953d576

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUvX:BbdDmjr+OtEvwDpjMX6

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-04_66365f562a17e687b35c938023231b33_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections