General

  • Target

    2024-02-24_1ae65b652bb0f2c680e5e2dc9c55f849_cryptolocker

  • Size

    61KB

  • MD5

    1ae65b652bb0f2c680e5e2dc9c55f849

  • SHA1

    6cc94d1c2c353b1d645de2e166545c6e6f898172

  • SHA256

    cb8b6fb4e50ae4c672d925ee9094bac9da57c82a658b3c7656b263400d874838

  • SHA512

    8426fdc73a94bd59d7118041752e8bbe2f1d0fd34e88b0a245ba18394ff9314b77b39917824ce65b3e7e8c554428e6c8a94bf536b189c5cb7e584f42f563fbee

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtskPih:BbdDmjr+OtEvwDpjM8f

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_1ae65b652bb0f2c680e5e2dc9c55f849_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections