General

  • Target

    2024-02-19_b3269622e1843905d8e77123658b1abd_cryptolocker

  • Size

    58KB

  • MD5

    b3269622e1843905d8e77123658b1abd

  • SHA1

    9e45b9fbc5e77f1bd950ac5bd4bb289e4f875f7d

  • SHA256

    8210a12bb05f2cb340d15653cbd0ed2e7e08b86ddcce024e106e5d0ff0bdc531

  • SHA512

    b6365b4aa3c9c87739277498c3a3854cb2ddb8fedfb4a093a3c9635e251cc6571839aac22b27bd5a1e416554d8b556aa616a292cab94689e600c6ef8ca239110

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61PTN:BbdDmjr+OtEvwDpjM/

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_b3269622e1843905d8e77123658b1abd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections