General

  • Target

    2024-03-11_5a5e9c226efb983e73fb7140f13d3c00_cryptolocker

  • Size

    61KB

  • MD5

    5a5e9c226efb983e73fb7140f13d3c00

  • SHA1

    147888694a9d47e666ddddfb4675eb8a2a374ad8

  • SHA256

    97e7c7bbb57c373804621452f0d6450ebe81a892c4a48a8f94a71793935c075f

  • SHA512

    5b5cf36a0736939e23d01a20f0fea8086db6fcb48e105e8914aebd8552bd8d850773d8d9ca5e6316b1bde448dd38cff8706a8918cb87a59afb5a6bfc6d451cf3

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgts6z:BbdDmjr+OtEvwDpjM8+

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-11_5a5e9c226efb983e73fb7140f13d3c00_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections