General

  • Target

    2024-02-18_6e46b6487d21443410b43704a0b38bb6_cryptolocker

  • Size

    60KB

  • MD5

    6e46b6487d21443410b43704a0b38bb6

  • SHA1

    c9173b4fdd4be161a91eb290d62ad5f4b71e00c1

  • SHA256

    b0538c09fc7a8896b4b8e76394b3cef3d3a2dd9094865819f16649098eabbdab

  • SHA512

    b61914955a2710d616263557a9f99f15a07b1ea0328524d705e5dcf5faf179a6ca6ea3799e1f8d716f517f9bc0b3210f555d79dfd483d8a1f81f1e4cbd0398be

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb614t:BbdDmjr+OtEvwDpjMK

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_6e46b6487d21443410b43704a0b38bb6_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections