General

  • Target

    2024-02-25_406e32523962af6d352d454b117c317a_cryptolocker

  • Size

    60KB

  • MD5

    406e32523962af6d352d454b117c317a

  • SHA1

    22bf91ce7fcac012f66c6bb79b6479ae15b897e4

  • SHA256

    6f1d951f9283b6ab4e8386529ba7d4639ed750f80cfe549606e541e8f8b9361c

  • SHA512

    989afe5a62e5a7586b63df8679e03c204cd9e9efe2613e0a671b1ad18d652a286e3e13d7522be60ffbd81ca271a6d3b5f11f376c9c884ea75a2ea725645e9bdd

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb614j:BbdDmjr+OtEvwDpjMQ

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-25_406e32523962af6d352d454b117c317a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections