General

  • Target

    2024-02-14_a8bf42f0e3d4c1d9a761c67288451b9b_cryptolocker

  • Size

    60KB

  • MD5

    a8bf42f0e3d4c1d9a761c67288451b9b

  • SHA1

    40557c09b2926cafa6a81202780a07853840fb4f

  • SHA256

    583513aca929c432e994433352e218f53a2873ac7500f2dcf01bb1bd974a8c2f

  • SHA512

    f8971dad1573f1cf5bfbd137c19b3b76f7d27b03184cbe72f5b1cd36b162543bf383a85b8d539b68e8666c0ef1b840c0933256648fe080b89701be589b955436

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtss:BbdDmjr+OtEvwDpjM8U

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-14_a8bf42f0e3d4c1d9a761c67288451b9b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections