General

  • Target

    2024-02-12_7c22ef7a324504edf2e6d0ec38c67338_cryptolocker

  • Size

    51KB

  • MD5

    7c22ef7a324504edf2e6d0ec38c67338

  • SHA1

    9d02227c3d33716bd9221bd4fbbead786774bb52

  • SHA256

    f3639bf5ad6e4be7e1cfbe966c8e03b951f72b6f96c366f612fc75c0311a8215

  • SHA512

    e4ddccf4fbbd3838df50116edbc499de625861b71ebceb7df12e8f41a6ae7bcdfd63ced30084a631412d8130c87fa892e6a37ce6b36fe96cce3200376dbd24de

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6Impy1:BbdDmjr+OtEvwDpjMK

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_7c22ef7a324504edf2e6d0ec38c67338_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections