General

  • Target

    2024-02-22_69e62bb8e612ad08dc9553d54c4d564e_cryptolocker

  • Size

    61KB

  • MD5

    69e62bb8e612ad08dc9553d54c4d564e

  • SHA1

    c628a10bb7ac62b6ec767249f1596c3f628b73c8

  • SHA256

    e1fc2f29204de69867ac72d0a2bd92ffac9d7e501fe5b1b605b7ed9962f59e62

  • SHA512

    740c1230dde4d59913daf6717a61b4d14804262d04346463b2fb7e66b9ea088a0335cffeac134c660b51fac53cd184202641b3ad41f58a19ee9584adef445428

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgts/:BbdDmjr+OtEvwDpjM8n

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_69e62bb8e612ad08dc9553d54c4d564e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections