General

  • Target

    2024-02-19_d5ec89af7fb53281e1a81c7f0507168c_cryptolocker

  • Size

    61KB

  • MD5

    d5ec89af7fb53281e1a81c7f0507168c

  • SHA1

    320ec9893249bd85b0ac9f4961a12bafee1abfd5

  • SHA256

    812a98bba35333fbe4418997e4753f2d1e1bb61e8c45db79bf659289b1680389

  • SHA512

    facbfbcda0c51345ebe629d6921bb8fc19f147200804f6903eb4bc42c1e9bd38bd43407b6be5527b984e032b3fd2fff21750d1b64af3fdcf03d6eac564e251c3

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgts9:BbdDmjr+OtEvwDpjM8F

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_d5ec89af7fb53281e1a81c7f0507168c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections