General

  • Target

    2024-02-20_9dd44d787c332f513b5849d53c818a95_cryptolocker

  • Size

    55KB

  • MD5

    9dd44d787c332f513b5849d53c818a95

  • SHA1

    e4b3e2e9878a52da15c4565f1879856c9f242ac3

  • SHA256

    eae2d104fb135576906428bcdd35ed218156445f95adc9a58f017c8d1b3e4824

  • SHA512

    2f7ea0a22f09e2fbaaf9360c16144a5d3e3e2423a992e511b9b98c174e6697f5b6bd9f71d6e4c60c6f9e9cd92044a0c5ab59feecc718781fc92aead563016fab

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb616b:BbdDmjr+OtEvwDpjMm

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_9dd44d787c332f513b5849d53c818a95_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections