General

  • Target

    2024-02-21_bd17d59c5e8510ece298e07af67adebe_cryptolocker

  • Size

    49KB

  • MD5

    bd17d59c5e8510ece298e07af67adebe

  • SHA1

    4a87c9dd9cb13c9d3876b6e1028311ab81836308

  • SHA256

    a69994c10eb6830234f6d5bf1d399ca99aa59fca9751cdf03041862697a7ae71

  • SHA512

    3e186493dc585b92617445069abb2b16a5415712f26f6222f724948a8a4a03b7022b76579e52823949694bcec20b9683479f951d9c2ca337115a53f159db4914

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUvu:BbdDmjr+OtEvwDpjMXL

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-21_bd17d59c5e8510ece298e07af67adebe_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections