General

  • Target

    2024-02-13_638ee44e23bbfa72ca6504f48f0f0ea2_cryptolocker

  • Size

    49KB

  • MD5

    638ee44e23bbfa72ca6504f48f0f0ea2

  • SHA1

    0a20a1e7172233bd4d30e3d3922b726e10865cef

  • SHA256

    2c35a51b7aa2cbe3853c23959f8cad1eb8dfa88f097457b59889d8eb8835a965

  • SHA512

    9f58beb33a4b6e0ec5266fcf488687d6edd72c9d1749c20f55583ec6dafaac2061a78e6fbe1c36ff3d56379f9444adb3d7a3e43083ff8da4ec3f8198b299edd5

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUve:BbdDmjr+OtEvwDpjMXL

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_638ee44e23bbfa72ca6504f48f0f0ea2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections