General

  • Target

    2024-03-11_520a14d229c40589d5bf89c1d0dd009f_cryptolocker

  • Size

    54KB

  • MD5

    520a14d229c40589d5bf89c1d0dd009f

  • SHA1

    772c63570de1f76d517bb4a5750b15af75800c25

  • SHA256

    e2efc5d36abde812969a3a2b0bf46e9c4c2e498614867be9d63af523d4cbaff8

  • SHA512

    0d7d09511beac810853431886f0875dde92cf037980abb0dd81845c28dc4022aa0072dbaece53474cda3fadb75f3144c905c8baf60210bc6711514518138f38f

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61H:BbdDmjr+OtEvwDpjMR

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-11_520a14d229c40589d5bf89c1d0dd009f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections