General

  • Target

    2024-02-23_96e2f2aaf903f156f32c1aadb1572500_cryptolocker

  • Size

    49KB

  • MD5

    96e2f2aaf903f156f32c1aadb1572500

  • SHA1

    8681eb914fb525344525421d28532497f5d6761e

  • SHA256

    98357a9731ade6bb8f3b0ea7ac6cb062609ca0a226269a27500639a8122cedbc

  • SHA512

    9aa8385617ec8032907e792e3ed7b09f2322e1e2457e4b9a202d5e658075064bb9454920ea1e035e732a8de98715cca5a6a504c7f1543545d50a986b71f914f0

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUvMW:BbdDmjr+OtEvwDpjMXo

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_96e2f2aaf903f156f32c1aadb1572500_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections