General

  • Target

    2024-02-23_1c47538afda14f5bf9573dd8608dd347_cryptolocker

  • Size

    49KB

  • MD5

    1c47538afda14f5bf9573dd8608dd347

  • SHA1

    e04ad14f503348fe0ae49b79da923f733a35f305

  • SHA256

    a8f80e1fb84d44a77304d80dfb4a623f1fff31b8beb095f89ba5e887f4a76f37

  • SHA512

    460f9b6bc9407c89562890e47bcf99683d643edadc6ac32e175c38f7d5fa2734456361cd2529c6aa4948000bfc6fa38558401ed065eea1951e47809edcb680e8

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUvn:BbdDmjr+OtEvwDpjMXK

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_1c47538afda14f5bf9573dd8608dd347_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections