General

  • Target

    2024-02-22_70e4322d5a6d61f7eda321dc30812a1f_cryptolocker

  • Size

    61KB

  • MD5

    70e4322d5a6d61f7eda321dc30812a1f

  • SHA1

    30aaf3bf546ddbfb0bbec593e500bad170e90ac2

  • SHA256

    d4c95e2d54db2f36a1b07d92f1cc2098e5a6a23d31866b8de458f2790c8d2f7d

  • SHA512

    a895eda7423663e7d6d32d5668069ae1f02b256794cf32427428e177a613e3e98ecb93263dba15e9e0c44d2c861cbe0c15772887102d8a84dfefa18479f7ac7c

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtskPs:BbdDmjr+OtEvwDpjM8F

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_70e4322d5a6d61f7eda321dc30812a1f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections