General

  • Target

    2024-02-20_32d8132f8473b5efa18fd1b913b680ca_cryptolocker

  • Size

    49KB

  • MD5

    32d8132f8473b5efa18fd1b913b680ca

  • SHA1

    7919f1b040faa58f3a3cf21e3bb073973f7e773c

  • SHA256

    8cabceab2a250cdc03dc14e92ce863f1d9af0d82c441fa3a289d6f37acc85fd1

  • SHA512

    802b350d6fefbf77f743c4e70a48ab5b7aff60758c0438689573fd2b3446ef75494fae5d4f70947302a5be117c59a08fb0892d63ce16e41067361fa03228a4e2

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUv5:BbdDmjr+OtEvwDpjMXI

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_32d8132f8473b5efa18fd1b913b680ca_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections