General

  • Target

    2024-02-12_c5c7f29c6764361530d758c0019f8dcb_cryptolocker

  • Size

    61KB

  • MD5

    c5c7f29c6764361530d758c0019f8dcb

  • SHA1

    a99019119505c435149b03c13df031e2cf7d847e

  • SHA256

    7a1a667696107e193b27d06769bb6b7f61d4927033de1bb3da468b5f6196989b

  • SHA512

    6f724ac0c8a238f241742c1b87c2263e2a9ed6a1d92b89040b8241cca15120f8e65304bbe9c952e011204b3f2f1e28fb615825a5f8bb48473339cafde1ad6bb9

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsz:BbdDmjr+OtEvwDpjM87

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_c5c7f29c6764361530d758c0019f8dcb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections