General

  • Target

    2024-03-10_a57e7be31aa54ce33979da3fad773ed9_cryptolocker

  • Size

    52KB

  • MD5

    a57e7be31aa54ce33979da3fad773ed9

  • SHA1

    409cef068868666f77765e2b170b2dca86b9b007

  • SHA256

    b8ae20788a75e9072a5f0f1c72620dbf9919b19645f479e51e80eef909a046de

  • SHA512

    3d760129d80b7b3d05633ca4366a1abbba8c6d18b9763ce1b7d5b6b870349bf5f3c8b70f4cb0eb6978c27f9cf621f1d9a620e12edbef024da2fcbe9d787fdbf9

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6ImpyM1:BbdDmjr+OtEvwDpjMX

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-10_a57e7be31aa54ce33979da3fad773ed9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections