General

  • Target

    2024-02-20_94ec1ff256b23eb949b4f748ceabee9a_cryptolocker

  • Size

    55KB

  • MD5

    94ec1ff256b23eb949b4f748ceabee9a

  • SHA1

    690cf71f4936e98fd6c9f53ed2ad2a8e419d1b44

  • SHA256

    bd6432abd35dee7a288063b726e12c901688d3e3d71d0f24c6bdb6f9863408bd

  • SHA512

    df91d83371ad2e5e88bde213d60da832613b7b00637de6709fdbc6e05b21e57115771fef78e9c409926f40d923f27babbb777dacfe2f5b5591be1042b3e2d23e

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb616T:BbdDmjr+OtEvwDpjMu

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_94ec1ff256b23eb949b4f748ceabee9a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections