General

  • Target

    2024-03-10_9b39bd1035ab9ef7b334e1209a701e09_cryptolocker

  • Size

    62KB

  • MD5

    9b39bd1035ab9ef7b334e1209a701e09

  • SHA1

    85627a7532e46804918e4a067cd9bc7b4cfbe487

  • SHA256

    d6c8e690e59327c91ece75b60d5ae817d8f67a0bb9cce5fb2bb3bb39c00f5937

  • SHA512

    59c322850b5a9df597202b8555f06f4e067d63a5eda059bbc3189ed8e731688872f4643bfb6225748fd798b0642aec2d8c3116214c1598cfb9254663b2e117d1

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtstx:BbdDmjr+OtEvwDpjM8T

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-10_9b39bd1035ab9ef7b334e1209a701e09_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections