General

  • Target

    2024-02-20_ba844022ace426af2ff879ea4bef184d_cryptolocker

  • Size

    49KB

  • MD5

    ba844022ace426af2ff879ea4bef184d

  • SHA1

    81159fc4dc218bd5c38be1232685f3e89182680e

  • SHA256

    597681b7d84776d1e43b526a91587e97069de477fc3e53efbcbdba7a4d2da3ea

  • SHA512

    1ed930d8882a17fa4fa0e05fc0a5fcd074f2b0c2ff5ab6cbb7f537c5e676d5d0432ee77b162f6d6e06fec52d628c352767fafa23f911588fc9ad8e6f444bf66d

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUvE:BbdDmjr+OtEvwDpjMXV

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_ba844022ace426af2ff879ea4bef184d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections