General

  • Target

    2024-02-17_05ad498ece8439101cd166926f216a60_cryptolocker

  • Size

    61KB

  • MD5

    05ad498ece8439101cd166926f216a60

  • SHA1

    3b888174a4220f0c47dacee2248dd6d1afec624b

  • SHA256

    3b177a0b3f0097ebe2b1ba8cfd62e6a455f67512387fc9fb08f6b58a7d8332ec

  • SHA512

    c9ffd60bba5843af927bc26bf2390bccb187c919774483b3483431ada3752707a27b7220644a40c94d4770875a0ab7b8e8177f707e8e260bdb377b24cd6e7124

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsKo:BbdDmjr+OtEvwDpjM8f

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_05ad498ece8439101cd166926f216a60_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections