General

  • Target

    2024-02-14_d4efa2ad7f2376c71f4fac729452e2f4_cryptolocker

  • Size

    49KB

  • MD5

    d4efa2ad7f2376c71f4fac729452e2f4

  • SHA1

    61efd1e2c0079e7a73303b1fbb59e6b40d59ed4b

  • SHA256

    d4b1cc39ad49a799cdeb3351308710a74a6ae5693c0da13de7b38182c89e7db6

  • SHA512

    410db0c07414abb086204e789f1cec90886adf13ef71bf438cb71bc079f63d20c8a91de7a6cb85d370e3be13a089774833274c882f5032b3e4db457aafd76f65

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUvk:BbdDmjr+OtEvwDpjMXF

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_d4efa2ad7f2376c71f4fac729452e2f4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections