General

  • Target

    2024-02-22_c8c8900937dc94531210e3d37348bc79_cryptolocker

  • Size

    61KB

  • MD5

    c8c8900937dc94531210e3d37348bc79

  • SHA1

    79126aeff30b97a7dc7efe2ac837218ad1c3ae43

  • SHA256

    60760f28b469fa46d831c289c1ddb306cc3e9dfcdd8318a13059a713b213d113

  • SHA512

    9052305656e620a847d962d74e591625953ef0459a87d81a984aea07313c84e7708e9ee6c410fbb524d616719c6a4402d8591bfedc6ab22fccd63d9a837aff85

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsv:BbdDmjr+OtEvwDpjM8X

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_c8c8900937dc94531210e3d37348bc79_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections