General

  • Target

    2024-02-13_d5abab26aab86a4fd66030f43ef9c365_cryptolocker

  • Size

    61KB

  • MD5

    d5abab26aab86a4fd66030f43ef9c365

  • SHA1

    2a4115fbb233b09a820fdbacac3195a7a7fab5ff

  • SHA256

    76fa96b5ae8e541c45dc858a4fd5b55e7c9f5403f564442d2d2893817425cc36

  • SHA512

    9f3a74e3400424e1cdcfb5eb5b1461a05217a709dcf0679354580e7e69eb0f39eec1741f6b9878deafc2a64f62af598265509ef2990bf45821ec3ac4d8f5d36e

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsE:BbdDmjr+OtEvwDpjM8M

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_d5abab26aab86a4fd66030f43ef9c365_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections