General

  • Target

    2024-03-10_9c0b1388d85145091d4c26eb4a21f695_cryptolocker

  • Size

    59KB

  • MD5

    9c0b1388d85145091d4c26eb4a21f695

  • SHA1

    1ddc0d4ea10696c2a23b6cc0b38f8cf9640430ea

  • SHA256

    c290025589c2986ffb9a61b82993443c2353f3fcfff0812d5aba9c4c3ed1d248

  • SHA512

    8b82ab9c17da15f94b0f8a7576e4e5b488244ebbf8bb28bceec072dfb901917cd101ea5e259aeed2384844e9fa428d75d4c850701ad3944d754cb304ab8109e4

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsQ:BbdDmjr+OtEvwDpjM8Y

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-10_9c0b1388d85145091d4c26eb4a21f695_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections