General

  • Target

    2024-02-18_7e78b8389d1d57ae9fe7823e13df13f9_cryptolocker

  • Size

    61KB

  • MD5

    7e78b8389d1d57ae9fe7823e13df13f9

  • SHA1

    531f0e2d7541492512d51849778e5cd506e72b23

  • SHA256

    c0d19f8abb2fb7c204d6cca8d5e9af14c0b07a5fd96a3f64ae98a547dbedbdc5

  • SHA512

    3b3114b4840815bd312c71901b2db9d498b0d5abcefafad77dbda1ee4c6812a41d3273b6d251f4c21dc3640b5d9b5f2c893b0899d2ff76c78639c6bf09a319f4

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsK:BbdDmjr+OtEvwDpjM8S

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_7e78b8389d1d57ae9fe7823e13df13f9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections