General

  • Target

    2024-02-12_646b21d08904142ee53c5f5da4fcd031_cryptolocker

  • Size

    49KB

  • MD5

    646b21d08904142ee53c5f5da4fcd031

  • SHA1

    051afa782e6ee8cc9a58cf5dd6020e60ff09c203

  • SHA256

    aafd556ea1ea56a8851a0a4d53277bccd9e039d2bb9273218180a4a59b4783f5

  • SHA512

    652952f7c92aaa94acbb56bb1e978413d7f13763258ce5409292eb89f9ddb14987ac1c9496e458a31adf3ae8275e0f2713351cbdded214efc5015bef1b8cfee9

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUv0:BbdDmjr+OtEvwDpjMXt

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_646b21d08904142ee53c5f5da4fcd031_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections