General

  • Target

    2024-03-08_4e2170edcc8db78d6f3511ee23365d9b_cryptolocker

  • Size

    52KB

  • MD5

    4e2170edcc8db78d6f3511ee23365d9b

  • SHA1

    f39869f0e02ecbcb75bbc2f96e475d99f1c037f6

  • SHA256

    2a81980d3fc3a7ab90fe11bc656fcf8916492e4cca6c01015e804bcfd46f168a

  • SHA512

    36cef3a163507f109964d35107608b87078687c060b47588473a96f587c1447ac4608cfb133c1fdac90bb901726fa1f676e338537b0a5be8e36515c2160e4edf

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6ImpyMC:BbdDmjr+OtEvwDpjMU

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-08_4e2170edcc8db78d6f3511ee23365d9b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections