General

  • Target

    2024-02-14_b31f3ddc8a1f5876d1ce7fc45ced51cb_cryptolocker

  • Size

    51KB

  • MD5

    b31f3ddc8a1f5876d1ce7fc45ced51cb

  • SHA1

    d2c1f82867ffa18a6c7587ead8aee7f60b2f7f5a

  • SHA256

    d6b1ed2413b7d93a5f6b2f63b4ff9e3dc8e0062f6c2d6b8b676d8f5f193c1b09

  • SHA512

    d34118954c2bb6df72d8e629e246d05de5cf08e53672574fba1dfd6a219f1472a992a91ad729460c7ccc7dca993f0fe05a86d8ca1b5c432f4d3d32209da5cb46

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6Impy0:BbdDmjr+OtEvwDpjM3

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_b31f3ddc8a1f5876d1ce7fc45ced51cb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections