General

  • Target

    2024-02-18_4692f89889e85fabcf3daab394e18204_cryptolocker

  • Size

    61KB

  • MD5

    4692f89889e85fabcf3daab394e18204

  • SHA1

    14e3fbdc80c3c7cfeec4ab341e99753fc99cd47c

  • SHA256

    48eb7837cdeb79687f0dbaa5aeaf9fadfbe8d84e7b06735cb721e0009ae3eca4

  • SHA512

    de78ee79d3a71f71bf21a7a2144790515ee7e4b90784c0742a866076e732da84dc4ebd13e6a980b1b4139234cc5c86c9eef70fa25ed0d54b781e4d0b5de4e4c5

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtskPl:BbdDmjr+OtEvwDpjM8k

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_4692f89889e85fabcf3daab394e18204_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections