General

  • Target

    2024-02-28_4589de3564029f7cda4267ae66be224e_cryptolocker

  • Size

    61KB

  • MD5

    4589de3564029f7cda4267ae66be224e

  • SHA1

    3a528438f56a6fe1f0a814d3b88f9a08fb90605b

  • SHA256

    26ea01aa32d3396d3fd8c3e530620fb6ee70dbab6d734258fa6ea3b77480bff4

  • SHA512

    4a20f208e8aaa60ff5d516dea8e1e369b3f5db7c49d4a1a91fc325fc950c258a0dffdce806a0e4df08692ffbe228dc9c97a91da97914652d389b8eb1b8d87504

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtskP8R:BbdDmjr+OtEvwDpjM8J

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_4589de3564029f7cda4267ae66be224e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections