General

  • Target

    2024-02-28_bae718f9cd9b3a7390655f10c5f51575_cryptolocker

  • Size

    49KB

  • MD5

    bae718f9cd9b3a7390655f10c5f51575

  • SHA1

    08c3aee39bc27f6b06c97c954847fe6a10da3d21

  • SHA256

    e971fe12d30cf07fe1004bcf15ae7849a3cf6a1c954fcf35b189b8990cf9697c

  • SHA512

    d32ef7d61128f96f260116d1a4276c436ac7e6652b43cd61e4858243886102dd3f899da662a391ef7150b11d7f2a88bb6d7f4309707a273aa49ca1f36cbb42e4

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUvMK:BbdDmjr+OtEvwDpjMX8

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_bae718f9cd9b3a7390655f10c5f51575_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections