General

  • Target

    2024-02-12_849d83c5261ee9f36333c505e2a2b954_cryptolocker

  • Size

    60KB

  • MD5

    849d83c5261ee9f36333c505e2a2b954

  • SHA1

    7790c80d336803dd8891f2511f5d78e31928780f

  • SHA256

    117d1888be530fac4cbbc207945f7ac36fdea96fa4de24cdd666407294b84bf9

  • SHA512

    e7e5c189263b4c0554ef5f085566383ac1a8f527bc8c55b9defea056b0ebd01bf3de53a1f9605fb6f355fa9d34a678f0544c0ed1a7e4c4074ce96cca32c30ccc

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtskue:BbdDmjr+OtEvwDpjM8g

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_849d83c5261ee9f36333c505e2a2b954_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections