General

  • Target

    2024-02-13_939a0258d4d3f104372dcf7d85e7f086_cryptolocker

  • Size

    56KB

  • MD5

    939a0258d4d3f104372dcf7d85e7f086

  • SHA1

    a61b51f7635b8e38812682343ed36d5f2df21a97

  • SHA256

    f6af733af4092c054ddd43a2d1fc714ad481c67ec8c77b0d77bf71e5875c4181

  • SHA512

    c7e24b26772b42740fc5a97e724895ea14cc2b43e8789111ad102a15c6724b1b7ab08aafb3eb6a89b6bf624277d51b0d8da5b5b1dae9466ea7455acb39f28b1b

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61N:BbdDmjr+OtEvwDpjML

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_939a0258d4d3f104372dcf7d85e7f086_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections