General

  • Target

    2024-03-11_9bbc3654bf035bf853d9d15d3864b2bc_cryptolocker

  • Size

    49KB

  • MD5

    9bbc3654bf035bf853d9d15d3864b2bc

  • SHA1

    500a4b8253adc2b189401d3be3059e4104ebe2c6

  • SHA256

    48a489e581639a66722b8c08dad46a77be4f106ac44903100f86ef3cae4ce421

  • SHA512

    96b44c20f8c46a56eb6d13cabf1ce7422cb60cef6ba6c91e80dd5e9d9f9a14bf57f34ff3751d7ad1f4a328e3404653b7c6bf506bcb7aec230d09b2e29b289072

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6Impy1:BbdDmjr+OtEvwDpjMy

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-11_9bbc3654bf035bf853d9d15d3864b2bc_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections