General

  • Target

    2024-02-23_77d91057c81a2b227b5b80b98390a57d_cryptolocker

  • Size

    61KB

  • MD5

    77d91057c81a2b227b5b80b98390a57d

  • SHA1

    f3b470406966b8dd1e5873db152a89ea2eb0bc27

  • SHA256

    b4a06ee135dbb7f96fc255b070267baa6c1ebc8ddddb7b4c240677c66ffc04f1

  • SHA512

    7c32db533889412ec796137644aa7bfd98e721ca3f35fc3f003327c535d6f975e295fa0097974b0a4cb9ef85f5dce226f2e80e5ad8776c41cfe178aafb1132b6

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtskP85:BbdDmjr+OtEvwDpjM8R

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_77d91057c81a2b227b5b80b98390a57d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections