General

  • Target

    2024-03-05_f32950bb9d2b5250599a0e4fd9551423_cryptolocker

  • Size

    62KB

  • MD5

    f32950bb9d2b5250599a0e4fd9551423

  • SHA1

    968778f7d657028fd1f6db15a782b2a11f30d787

  • SHA256

    7bbbaf067838dbb93f6b97ec6149991a9258a2a9e580b708bbb0cce817b6daa8

  • SHA512

    fd7637367c8e8787fe024b0cfd9e4385a900858fe08f3b139b4f033f6b556882eb0290bf6e02b0fef8e94776f18483e87f353f29a5e7d779cac5d3f3b5b00c6c

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtskPS:BbdDmjr+OtEvwDpjM8n

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-05_f32950bb9d2b5250599a0e4fd9551423_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections