General

  • Target

    2024-03-12_a09ea11e1e34fff17721624d6da240bb_cryptolocker

  • Size

    49KB

  • MD5

    a09ea11e1e34fff17721624d6da240bb

  • SHA1

    bad6891e9bb0a112c3961ce3faa5665f1c3e8169

  • SHA256

    f4ebb415f64b9810fb72a916c703d30a8c772807c5be2189c139b5d290585090

  • SHA512

    3fcc624d1a1cbadc8373082d85ec3c9d7ba5b561cca7c868bee0792b60f8e781a9921364b15d27178f9c6677b319a7076d81ca0c7b097c7d4c18cb6b5b6ddcf7

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6u2bS:BbdDmjr+OtEvwDpjMr

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-12_a09ea11e1e34fff17721624d6da240bb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections