General

  • Target

    2024-02-22_4e56d4a8272f5ca6bc1f9ad69545f707_cryptolocker

  • Size

    61KB

  • MD5

    4e56d4a8272f5ca6bc1f9ad69545f707

  • SHA1

    faca278cee4852ec895186fd1c6c02040e5e512d

  • SHA256

    f0ee9393f04c188ffb44fef1e1b488622b094acaf932dca034bc82f2b0e796cb

  • SHA512

    cf02407b6e0966b907615f7a6c20765a0e2170aeabec8843de1616d0086f8d2a582a0becd35ecf20c91d63f443d7ed69c557354271da5df8fb2254f6d6f44a35

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsp:BbdDmjr+OtEvwDpjM8B

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_4e56d4a8272f5ca6bc1f9ad69545f707_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections