General

  • Target

    2024-02-24_763b4b23e0bd9cb639e22328965ab90f_cryptolocker

  • Size

    50KB

  • MD5

    763b4b23e0bd9cb639e22328965ab90f

  • SHA1

    34ac92cf5b3217d022a79ee9e60fcd9acd3d2c7b

  • SHA256

    7895cdd946d3c8ea939f59826209fc7ef9c9744ef5fca18080426c45496f5d49

  • SHA512

    06b448108cd897b1ea2d32dfc6ec468c4c9c76b49e24d16e2a3b74b52030c0b974fc1ac34dd7531d4f5bd44894443c30b73e122231a8a72d7df4782c7fd929c3

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6Impy8:BbdDmjr+OtEvwDpjM/

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_763b4b23e0bd9cb639e22328965ab90f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections