General

  • Target

    2024-02-19_626be353ae63d765f8d64354eaf73934_cryptolocker

  • Size

    48KB

  • MD5

    626be353ae63d765f8d64354eaf73934

  • SHA1

    4fab33ee6b7a39fc0286bcdc603370281a0d9d8c

  • SHA256

    7259e795d9431fbb7a28ec12634a04c51514317b797c4ffced4a538eca636055

  • SHA512

    cca2da10ea6c7de185db9f05f1992685c9541cda6d50b18b943467f9a638842826dccbd03addac6fab340384a90a57cf73c2c071945e1fef799a99b6bb673eb9

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUv5:BbdDmjr+OtEvwDpjMX4

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_626be353ae63d765f8d64354eaf73934_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections