General

  • Target

    2024-02-24_d60623f091484aaca85821e0551bc409_cryptolocker

  • Size

    32KB

  • MD5

    d60623f091484aaca85821e0551bc409

  • SHA1

    867ad9b99bda12b3c8d1be169d3f9383059508b3

  • SHA256

    7757c0bff27d069158fcd6150d7011cc23a4d22196d15b589225c947c9918f61

  • SHA512

    dc61a2aa208972f135ee2bdb58a94a5dda288f11e8b617ab0f202d9cf02857f20d48bbf014b1f0b805a905f1be6b795c08b84547e57145bad82e5d37a0f838a2

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tHmNUN:q0zizzOSxMOtEvwDpj/arqc6

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_d60623f091484aaca85821e0551bc409_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections