General

  • Target

    2024-02-13_8bc5de33b0ce370e9c5e16c7caf0b0ed_cryptolocker

  • Size

    61KB

  • MD5

    8bc5de33b0ce370e9c5e16c7caf0b0ed

  • SHA1

    047dfb4cf6df56fc971816acdecd685b5217d72d

  • SHA256

    cfe4ea338e6612c3bf3ff7f1e51b710a5f9de69bc47def843bf9ef6c58ad253d

  • SHA512

    5ee5a85796ca440c93b12b7d66ba59c88a070c613bfc6c0be3f011df3bbeff34c518769f0d5c965c0ce0adc5f1610e9dcbe4507581f6ea77caf5136e14eb0f9f

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgts7E:BbdDmjr+OtEvwDpjM8g

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_8bc5de33b0ce370e9c5e16c7caf0b0ed_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections