General

  • Target

    2024-03-09_4e65eef9de1d0d361d262296150e287c_cryptolocker

  • Size

    62KB

  • MD5

    4e65eef9de1d0d361d262296150e287c

  • SHA1

    3e4ae26dd254f20d9f81ca11ddc1ea5fdabd31ae

  • SHA256

    58e1a204fa55f3e6a9c5ef5e521ebc0564dd0f42c132aa4524003e9dbc86b1a0

  • SHA512

    0968fe4588e752af098028f1d8336fee1f31c1b5cf8e4820e472e3069ada8e4557102a39d2ae75297cb27a97a4cb1bfd72e27c609ce3cfcf49fe96870729db2f

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtst0:BbdDmjr+OtEvwDpjM8i

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-09_4e65eef9de1d0d361d262296150e287c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections