General

  • Target

    2024-02-20_4933d3ed14a7599eb4b2cba871070997_cryptolocker

  • Size

    55KB

  • MD5

    4933d3ed14a7599eb4b2cba871070997

  • SHA1

    7ded51620ec0213f4bfc3cd281a9a5a2598f5a53

  • SHA256

    5c2d0335670d25d044ad0b2affacd9d8cca0c9597fbec9d78738e5be5491dadc

  • SHA512

    a7ceb9b2aabbd96ab19c3cc850def6bc49e649c7ddc66ab294f1d7e29e8983650e28627b01fc57fc494020a139a13c59440e530a585377790ca54a2d903f4499

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb616Y:BbdDmjr+OtEvwDpjMp

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_4933d3ed14a7599eb4b2cba871070997_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections