General

  • Target

    2024-02-24_d04e1ef5ef2a61ae977e353f679e494e_cryptolocker

  • Size

    55KB

  • MD5

    d04e1ef5ef2a61ae977e353f679e494e

  • SHA1

    9419ca92c17f968fed8558c3e8e0167ff6ab3cb0

  • SHA256

    528ef6bbf78a330f4f915ca5ba35bd131284124335506c810cfab4e0e261b59f

  • SHA512

    44aec30e38794bd8564dc1f98d351d45314a70ccd398579c37851211807a84aaebecdfa8ef7e78dcbfa4e453e854ed71ddbaf1e2a40701979c9f3b9730b43058

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb617xBj:BbdDmjr+OtEvwDpjM5

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_d04e1ef5ef2a61ae977e353f679e494e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections