General

  • Target

    2024-02-23_befc9c02d94d6d2ece4c1cd0c962ecc5_cryptolocker

  • Size

    62KB

  • MD5

    befc9c02d94d6d2ece4c1cd0c962ecc5

  • SHA1

    6a2b3056d4df78928bfc107e6ae2e547f398c11e

  • SHA256

    5abab015f27ef778eb6ec12137b76565e9dab41701ded740303293504b3287e8

  • SHA512

    6c43aff09a26d781a4a8a74501b34e5fb91a3604e84a8b3f329356c13446dc6a6f7d989fcddc9d281f412953adb8e8643d707dc4a5cc4226ca3410c529867b31

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsm:BbdDmjr+OtEvwDpjM8u

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_befc9c02d94d6d2ece4c1cd0c962ecc5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections