General

  • Target

    2024-02-14_36d242f8989676e17cb716a0a4296c87_cryptolocker

  • Size

    34KB

  • MD5

    36d242f8989676e17cb716a0a4296c87

  • SHA1

    c76537674b087c04fd3fdf3ae7fcd39936709bda

  • SHA256

    9b3c4efd83c843640622715c76fdb971d2c11530bcfd33ee3ea4174ed97d3b51

  • SHA512

    2ef80030bc1dec1ce4d638801f81e1107331c0690d819a31552d9894b57ff48e5a0292f6b322396cbe53b74b41ade8d49e4acbb9010508759a6fa3c2388f461b

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoWDw:qmbhXDmjr5MOtEvwDpj5cDn

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_36d242f8989676e17cb716a0a4296c87_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections