General

  • Target

    2024-02-25_30593d60ef1f8c46821730b79a4ed0b7_cryptolocker

  • Size

    61KB

  • MD5

    30593d60ef1f8c46821730b79a4ed0b7

  • SHA1

    e181c8811d5835418b0bd9c1a904358297af2ae0

  • SHA256

    42ae273e6c8972e768f84f5c7d59ce9c19c63190071747c29d428e55d184733c

  • SHA512

    d97b58b163122a0aa98fd250e2bbf5d27c8b6ff2c76dfd0478b0d8cf69876ff2af80ecb127fa354ab2b87b24f1e90c5298969971bcd7e15929832607761d1607

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtskPR:BbdDmjr+OtEvwDpjM8o

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-25_30593d60ef1f8c46821730b79a4ed0b7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections