General

  • Target

    2024-02-18_1a63023a5898287fbdc0850e421bc945_cryptolocker

  • Size

    61KB

  • MD5

    1a63023a5898287fbdc0850e421bc945

  • SHA1

    a7e136bc94e596193bbbfbbf7c15093dd44a2abd

  • SHA256

    a22bd93397f9d43eb9b9efe1a0dcda3b70b465255a7959c8f4827acbd4523ea1

  • SHA512

    2726ef8d1f4ec2b8ca35c20cbac9f3aecba707507c8c0f9262b066ce1cea77236b3efab985ae3731bd2c442dbe740dbd9d66a102f684531d62ea8dbdf3e0a819

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsKU:BbdDmjr+OtEvwDpjM8b

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_1a63023a5898287fbdc0850e421bc945_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections