General

  • Target

    2024-02-13_448117a5df34cf346ab6939dcad9c15c_cryptolocker

  • Size

    49KB

  • MD5

    448117a5df34cf346ab6939dcad9c15c

  • SHA1

    760053ae30ad815774ff01122bbb515a786b476c

  • SHA256

    091f51b5e2f2f9224c160ec56c89c4a4074ebc47d504119de03437d05e479fca

  • SHA512

    8bc54b560db79871dba9d438e14efbfc011502a9c5277ae5c28fe89c5556743b1d87e8923fc050f519b6bc4bfa1234f69cd386135eccbd56478f638530c1ca8c

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUv2:BbdDmjr+OtEvwDpjMXL

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_448117a5df34cf346ab6939dcad9c15c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections