General

  • Target

    2024-02-28_284f71b1eab513d555ae05d6f75b80fe_cryptolocker

  • Size

    49KB

  • MD5

    284f71b1eab513d555ae05d6f75b80fe

  • SHA1

    a7a4a240164b3344cccb1db3fbaa94557b4721a8

  • SHA256

    18c6fb7eb9f3b42530cf099336bbbd9594ef6e74fbcf4833c8a9e7997b9cf1e8

  • SHA512

    2334f5b66941342941bb7937bdb047d2508cc689fa347bbdf098e8843bab813c8512c8c17f8ffbe1005268102fd14f4eb83a3bb6e3673c5ddb6790e4339625e4

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUvb1:BbdDmjr+OtEvwDpjMXI

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_284f71b1eab513d555ae05d6f75b80fe_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections