General

  • Target

    2024-02-22_63e87767b47f3b93e422d5f838292abd_cryptolocker

  • Size

    61KB

  • MD5

    63e87767b47f3b93e422d5f838292abd

  • SHA1

    5e91e21f2f3fc26d22281c8f8e056476bf179005

  • SHA256

    6dc233f43bec7b4db95f7ae9bc2731a91a82f94099cef52f8a0a3b3e2712f50e

  • SHA512

    fa1fa2f93c2564459a2573f4adfbe53b5d55328cd5acc91c2553ca7242d88abab314d23c187cd42aff6612011b9395551f933e8a2abec18d2e76268795510854

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgts6i:BbdDmjr+OtEvwDpjM8v

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_63e87767b47f3b93e422d5f838292abd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections