General

  • Target

    2024-03-05_dfa5780bea10db4d0cb07f48cbafbb49_cryptolocker

  • Size

    61KB

  • MD5

    dfa5780bea10db4d0cb07f48cbafbb49

  • SHA1

    efacf5a06fd9925871d2a992175c2eb6886d9001

  • SHA256

    2cf7ed2de6a896dd9902cbcd90052eab20841b5ef939cae1ff29057428586b2d

  • SHA512

    b5edb57a838736d5986e70179d3bd3c7bf6a956700e8457ae067ef4fe3ae858b37e88fd9911b1aba2e8bde62a8dd858de317579516ed58989adfc16db2940ddd

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsN:BbdDmjr+OtEvwDpjM8l

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-05_dfa5780bea10db4d0cb07f48cbafbb49_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections