General

  • Target

    2024-02-11_a117e40cd75bb524805f042be8b8b4e3_cryptolocker

  • Size

    50KB

  • MD5

    a117e40cd75bb524805f042be8b8b4e3

  • SHA1

    6a502e0bf1cba2f6f7e7caad794f71440ecc89ce

  • SHA256

    67e0fda43969be46e63227edfc3c81aff9677fba03d561f31033b18a0c842158

  • SHA512

    7a3599b6bb8a3ab4ae9b8aac8b30bd05d20fc779a2a33bac821d93b93a401b432e756c4de0c45358fff14fe699d8514a7b33d6fc299d6c7adba68d918ca81973

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6ImpyT:BbdDmjr+OtEvwDpjMQ

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-11_a117e40cd75bb524805f042be8b8b4e3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections