General

  • Target

    2024-02-18_65d5b68017cecc1d7d356699e6b355d4_cryptolocker

  • Size

    49KB

  • MD5

    65d5b68017cecc1d7d356699e6b355d4

  • SHA1

    b5eefc1ccfb4fb06f9ad4fd68d2e1d6fe7a310f2

  • SHA256

    73e8fd780342cf03b70b85cbf674c9f198a06dfb720e855514b047539ff14166

  • SHA512

    becc059c057c5ba56fddb5a41f7d3a9ad055151d0dd981d93219e14ddf0cc54409e3b8f30a5f37da8038291d0ede5b7e1546f4731f555f572487afc6063a5d02

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUvm:BbdDmjr+OtEvwDpjMXz

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_65d5b68017cecc1d7d356699e6b355d4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections