General

  • Target

    2024-02-19_5863a60a63c681138579d92ad9f00437_cryptolocker

  • Size

    51KB

  • MD5

    5863a60a63c681138579d92ad9f00437

  • SHA1

    ac4f0e8a0e4aa083914d2ec60e0394d84a4d0519

  • SHA256

    22f7a9629379ce1aa2196cdd4e504c1f0c77a5b536fce57f9cdfc3cfbf79e5a3

  • SHA512

    1c7d338b40eccbb638f9c54bc588e83446ff15a23f0a2f7a740fe01eacd106affbbd81791b142cfaa1ec0912177cca6dde905249e91f3bf72cb384f20a930e98

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6ImpyC:BbdDmjr+OtEvwDpjMN

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_5863a60a63c681138579d92ad9f00437_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections