General

  • Target

    2024-02-22_97b45bd0bebadff692014cba7ec8229f_cryptolocker

  • Size

    59KB

  • MD5

    97b45bd0bebadff692014cba7ec8229f

  • SHA1

    e976d85cee59e73af9324744ec075321de6f1e6d

  • SHA256

    fa6352d18cedb7b28d27313430710fc7bd8c0b98d49dc1ed2fd009b94c1cd405

  • SHA512

    e725b828c41a77057ccd448e8b1e6b833be2c1ec3575b79fd2206fc11c809cd18efd5e315301c9d17c3ff53a5c61000a4d0bea59db1dbe1c0ab50675fc779c6b

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgts+J:BbdDmjr+OtEvwDpjM8m

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_97b45bd0bebadff692014cba7ec8229f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections