General

  • Target

    2024-03-10_4af06c4b07f8be6f2423170210cbd268_cryptolocker

  • Size

    50KB

  • MD5

    4af06c4b07f8be6f2423170210cbd268

  • SHA1

    e28723d339466068eb673a750bed0241e2966cce

  • SHA256

    e89c3502291efd093510930ccf9a98e2061d4707356f897436eda5a2365eb599

  • SHA512

    41ce518b64c417b7ab6bf1b59ba6c22bf244b010e81175d242238f88043e6d65157cacf5f5e9991d51013a9dc7d1891e9d55777e40cc3a1bd2ef6f9b70df61e9

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUvB:BbdDmjr+OtEvwDpjMXQ

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-10_4af06c4b07f8be6f2423170210cbd268_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections