General

  • Target

    2024-02-23_c49c831f1a79f6b17c263c872acf0b02_cryptolocker

  • Size

    61KB

  • MD5

    c49c831f1a79f6b17c263c872acf0b02

  • SHA1

    850b1b93d63adf9af22ba1f66bf01d168179ac4d

  • SHA256

    249ddc5ee792c4beaec70c87ee1d30967042a173c4a45e561665e0488d586961

  • SHA512

    15bfb40257d66e07497c66e137f14a6c0f8b8216dd85565d3b60a4da4872b5df3f0fa5ca4e77cef4cf0ef3a4144a3fa0fa331145f82c5212da9696f5c8303bb4

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtstE:BbdDmjr+OtEvwDpjM8C

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_c49c831f1a79f6b17c263c872acf0b02_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections