General

  • Target

    2024-02-17_9e074b2a879643e46b948791543221b9_cryptolocker

  • Size

    51KB

  • MD5

    9e074b2a879643e46b948791543221b9

  • SHA1

    8ed9b9f27e3d14a6a883f1f960202aad74baf836

  • SHA256

    4791e667c30fee8ce2526e18c8e12186f0c3a6183ad3b58b2b43de5967ea49f3

  • SHA512

    748fa881a412bc796a9a9c06105b3f0bb0397b44c6cae5e389937e76506823cab70d337b2bcca37098d514aab54a8f9c6d55c35ccfedc60c496ecb0fb631b0db

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6ImpyT:BbdDmjr+OtEvwDpjMQ

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_9e074b2a879643e46b948791543221b9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections