General

  • Target

    2024-02-13_39f625ada851d89f2e83bb2ac7adf529_cryptolocker

  • Size

    60KB

  • MD5

    39f625ada851d89f2e83bb2ac7adf529

  • SHA1

    eecfa65b3ea655b983c912ef165d63fa36143d98

  • SHA256

    fd05417c0188a34d2f6e4d1b7f76138da12df4beda29de7610b293d3b4089537

  • SHA512

    7b9dedd288027b8d7fd496e381355c44de887fc91510a203c9eadf52356a532c72d733fb8da6d06c2551f0a71b577b95bb9e10446cd7ce5104b1b7dbcc909d4f

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsu:BbdDmjr+OtEvwDpjM8W

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_39f625ada851d89f2e83bb2ac7adf529_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections