General

  • Target

    2024-03-12_6ae5003fc135fe7381de0c0c31682f45_cryptolocker

  • Size

    57KB

  • MD5

    6ae5003fc135fe7381de0c0c31682f45

  • SHA1

    60868c553abd3f4cdeeb0b0dae9ec9c9173e7d40

  • SHA256

    1c056b4b0d36aed81f6ac8993fdef355c4fd001cfbce63b6e7fa57b806e0c34b

  • SHA512

    23cdc3e6a590fceb99293b60e8b032889cffdfa45f3fc935d097520ebc1a9f65412fe978deb7c53199a869496fe3fe98d0551c9e93e0720b28735f7fb1c70ec4

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61n:BbdDmjr+OtEvwDpjMB

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-12_6ae5003fc135fe7381de0c0c31682f45_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections