General

  • Target

    2024-02-21_4cc9adce6db27ee3a373deb8e87d1e1e_cryptolocker

  • Size

    55KB

  • MD5

    4cc9adce6db27ee3a373deb8e87d1e1e

  • SHA1

    a6fd0322ef528c1554fbdc215e75cabaec84d4f3

  • SHA256

    96ede3fa53d5332645dcf237db6565eb4196aeff6311502b93cc16ea83c4bd60

  • SHA512

    8c6b828276e20e05d49bdd80b141828fa56bdd65efefcc3b192c65fcf9d879bf9844c3ee3ed9b51bfd868f1c2d886cd814eb99f6b267c663758242a24ce926fc

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb617xBr:BbdDmjr+OtEvwDpjMx

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-21_4cc9adce6db27ee3a373deb8e87d1e1e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections