General

  • Target

    2024-03-11_b50fac1ded658d2651950e548b7241df_cryptolocker

  • Size

    50KB

  • MD5

    b50fac1ded658d2651950e548b7241df

  • SHA1

    2e7a6f9095ba72f7b4dbbacc689ab09f7d0cfc25

  • SHA256

    17ff8ed01754920f2e230a8cdca96fbff48a95f1b44b9f202d2eaa78a9fa019d

  • SHA512

    35df4c1996f8e004d37d844fef09d51d1d7fda165d62dcd1417ab25e29e877213a30e1f7b47244a8f89e611f90f5c7a74c6841c743ea03822b81507bbc56e68f

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUvS:BbdDmjr+OtEvwDpjMXf

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-11_b50fac1ded658d2651950e548b7241df_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections