General

  • Target

    2024-02-25_3e7fa44c7de1b5a6b247f16e2690ba2a_cryptolocker

  • Size

    56KB

  • MD5

    3e7fa44c7de1b5a6b247f16e2690ba2a

  • SHA1

    8b3a514a5cb8571e3952a07cf994fda7f737905d

  • SHA256

    aea48acf368c65c5663b049b3247435cd4edf82739f50d94a6f5412973f6bc5e

  • SHA512

    30bd3affaff38c15f6a0219e41500c5d2d9ae1b974073828de27399f01c252678da521aaac71d1b8bfa01acc5fe5883d054ee2bf689ce0e9e613866f9f00326d

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb616Z2:BbdDmjr+OtEvwDpjM1

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-25_3e7fa44c7de1b5a6b247f16e2690ba2a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections