General

  • Target

    2024-03-07_d662f14c994f642d32d55fab8cbdfb27_cryptolocker

  • Size

    63KB

  • MD5

    d662f14c994f642d32d55fab8cbdfb27

  • SHA1

    9405b3d9fc6d678a9b185b9cdfaeba86a5017c85

  • SHA256

    dbdcc4cbd95e6aaa23aca97c162c869e800aa687fd41dd062016381def8151aa

  • SHA512

    2a4dbdc7b61dee73db6f3e9e5de9f20f24f1a45733e5e187ee8c22b9529ad61c8286d7b7763a0381dc44b5de6cc56871c144a4766774216783836794e7926036

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsg:BbdDmjr+OtEvwDpjM8I

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-07_d662f14c994f642d32d55fab8cbdfb27_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections