General

  • Target

    2024-02-28_53be019d1ee96435ff579b0626700398_cryptolocker

  • Size

    62KB

  • MD5

    53be019d1ee96435ff579b0626700398

  • SHA1

    de336ce72357752eb943ddb1d63a6538dd6a4e40

  • SHA256

    0543cafdc70a64846fd56912a0125383a14b78afa217f0b3ddf1fca802a8a3f2

  • SHA512

    b9a28126fc16ae98751dd31aed88df544b8f3c71c894653d42cf1ef009b94ce855e1f34825eed60b43d2522d62685e91af0716e4f3a48b7d13ed5670d9c520c6

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtss+:BbdDmjr+OtEvwDpjM87

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_53be019d1ee96435ff579b0626700398_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections