General

  • Target

    2024-02-27_9b06514f315d2d7565f71b02669b6017_cryptolocker

  • Size

    55KB

  • MD5

    9b06514f315d2d7565f71b02669b6017

  • SHA1

    51a625f287024118a14530e1c8423138e043e89f

  • SHA256

    f0880bc1e2ef0b446399fdd653922cbc657761cb6af2b7df9a718a1615cee04e

  • SHA512

    f79047683fd07c80b0be199adb15440e049fb175495e66a33d010bc24855fce1a00a01bbb431c587e2387eade5076ae4e429b520720d3500f41e72c59fb4be74

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb611:BbdDmjr+OtEvwDpjMT

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-27_9b06514f315d2d7565f71b02669b6017_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections