General

  • Target

    2024-02-23_44017818687331bdf1e1ca2abe018a20_cryptolocker

  • Size

    49KB

  • MD5

    44017818687331bdf1e1ca2abe018a20

  • SHA1

    5591b46866380d75e4e9ce11ec3eb3e5ee2ce910

  • SHA256

    0b1c1d560e0d0ce2212ffdd28061453ee28eb965ed01319ce3c2cf94a7eb5df6

  • SHA512

    faa1a255bd0eab89791d3d7471c72c917e0cb95091049722a0d7e5225c5a021ddd945db47b7fb8b20f6aa39726891c27ae2efd5af89f48038bd2e3155cc8a41a

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUvK:BbdDmjr+OtEvwDpjMXn

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_44017818687331bdf1e1ca2abe018a20_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections