General

  • Target

    2024-02-12_8052f5c219137ede2d6a1d7e64d93247_cryptolocker

  • Size

    56KB

  • MD5

    8052f5c219137ede2d6a1d7e64d93247

  • SHA1

    7c509719c2b2e6c23b767a61897fa40dcb6ce80a

  • SHA256

    a19d52b709549e10e691aa504bf0733fa9050ffdb29e0422b4d052117d684575

  • SHA512

    918281fd590cbedb93c9a62fef7f1c3c13c42c9268aa809226d2b5bc6d281c7d6a587f591d6ae38b6a776d333743cd9492dd04c106e118c317352c2d14c67b17

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61q:BbdDmjr+OtEvwDpjM4

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_8052f5c219137ede2d6a1d7e64d93247_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections