General

  • Target

    2024-03-11_1ee31c44555bd9b388c826f5152a1f30_cryptolocker

  • Size

    32KB

  • MD5

    1ee31c44555bd9b388c826f5152a1f30

  • SHA1

    a05e50d05a8d719c48b4b73cf61333499658e36f

  • SHA256

    3cd1fab2f01273af5b5b09b354ca3fd2a5a316d2a84890d75155bdffc0ff7add

  • SHA512

    363bf3f27305d05dbfa0efff009d86443be0babb4e6ce74a1da799a78d288926394830b7f26cf484e7f1bf105d309b68a1bad0e19ad6ad3dfc68b5c5cd421eea

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tHbjuM:q0zizzOSxMOtEvwDpj/arq2M

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-11_1ee31c44555bd9b388c826f5152a1f30_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections