General

  • Target

    2024-02-23_20bb7de1249b9424da218aa3cf49ba65_cryptolocker

  • Size

    59KB

  • MD5

    20bb7de1249b9424da218aa3cf49ba65

  • SHA1

    5817a7ffed24fb7d6305e0b747026365d95a7da8

  • SHA256

    e4465155a55ffb454ae6d3c4d906a753dcb1f3cb89f907afe6eb7f7485e8943f

  • SHA512

    d4054e2215aff6e06e53dcdbaabbcfc18ef49da17095385afd04a074a3c2ed153180cb6206fe429bc79bd098983b72fc560b571babd304cb0ca5eff9e7695bc9

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb614P:BbdDmjr+OtEvwDpjMk

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_20bb7de1249b9424da218aa3cf49ba65_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections