General

  • Target

    2024-02-20_1393b912a427377bd70e8624d71ab665_cryptolocker

  • Size

    50KB

  • MD5

    1393b912a427377bd70e8624d71ab665

  • SHA1

    25e99e892f225c3c9876de8b71526004793303c6

  • SHA256

    d85e4b08ff7a237b95001afa8ab22bed75e872300566977d54345e03728be175

  • SHA512

    1d0986890093636d1c3bb583de93d41ff1e097340bea38ff76d385281750a8f5a4d469471cbe6cfd67b68a26f03e966220590874599158ad533cbdbfe51e4cf8

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6Impgn0T:BbdDmjr+OtEvwDpjMt

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_1393b912a427377bd70e8624d71ab665_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections