General

  • Target

    2024-03-12_3440f61e67fcdc6103e857796aaefb95_cryptolocker

  • Size

    26KB

  • MD5

    3440f61e67fcdc6103e857796aaefb95

  • SHA1

    0ccc43722bac3d559d9efaf3cc661094c50104a2

  • SHA256

    8bc19b96d3b335cf3a19f2f181b46f0d766837b9205b831ec83f98e67a41c04c

  • SHA512

    7ff1c31985cd819a29937c4eea3a6f51939ea24b03f715872a25cca733e38cf053454310fec22833ffe2016c284e25f845ae82ef2578af4403671fe2d2f33449

  • SSDEEP

    384:qxOZzyjOnqGAs+8ULueO4NdE8tOOtEvwDpjqIGRYK1sGGYkxlme:q0ZziOWwULueOSdE8tOOtEvwDpjeoR

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-12_3440f61e67fcdc6103e857796aaefb95_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections