General

  • Target

    2024-02-23_c6b960306c41f788d9c4a40cc8045bdd_cryptolocker

  • Size

    62KB

  • MD5

    c6b960306c41f788d9c4a40cc8045bdd

  • SHA1

    cd53a251b7916bc9fb02b59719221b692e60c68e

  • SHA256

    3216f26c2e7c9f4c3423dea2b1e4d767287a060a51d6061fb0fcef746a33b1c4

  • SHA512

    9eb40c4c4c125dbb6aa931d54a07a54d159821ce9bfa15fe7eccb1190b7a7f7de3a2b0aa8bfd419450ab6044cedbd35ea40bf7bc48df382a2663c5e2d739184b

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsB:BbdDmjr+OtEvwDpjM8J

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_c6b960306c41f788d9c4a40cc8045bdd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections