General

  • Target

    2024-03-12_8d44a54c26ca5a96a4bb1e3676fe6a2a_cryptolocker

  • Size

    54KB

  • MD5

    8d44a54c26ca5a96a4bb1e3676fe6a2a

  • SHA1

    e504d5d3bcd5908e311207c6d2f37c97c529d4f5

  • SHA256

    3a8a59a91dfc142262da729f7afdd7060780e823ab51808684210fe00655441b

  • SHA512

    2b5b71f4b1dc407a7fa209a3dd635475191a032313b88903c521f39014e3f913ecb3a2b5667517c6916b3708df4cee072a4c0911d0e72f94a400d1289cc18179

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb617xM:BbdDmjr+OtEvwDpjMw

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-12_8d44a54c26ca5a96a4bb1e3676fe6a2a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections