General

  • Target

    2024-02-19_050bb8aa2772975d892df1f2d834b902_cryptolocker

  • Size

    61KB

  • MD5

    050bb8aa2772975d892df1f2d834b902

  • SHA1

    ab1084517af3d36bec28ec4b406ad662dc81236d

  • SHA256

    e6291e8611a18945f910aa994a0a0b6771ee1ca1c287617db524c34ce084b1f4

  • SHA512

    a49bf26bd2c713e88ac1cf7ba1910f5d114d714b53d4135602686ccc8200fc1c76d09b4523d95e7c61e21e2f1321e00c11453b95e31d9a4a914e03bc8cee47fc

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtskPX:BbdDmjr+OtEvwDpjM8K

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_050bb8aa2772975d892df1f2d834b902_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections