General

  • Target

    2024-03-13_6f3a40934855f7e6eb3d53bbd59f7621_cryptolocker

  • Size

    62KB

  • MD5

    6f3a40934855f7e6eb3d53bbd59f7621

  • SHA1

    174fd5a94f16f9bf9f89526709496131c4e3ec5a

  • SHA256

    1ca7e73255b8a60cff373a57bb242e315c432b78ecc02859f3e6e31ecbdd56fb

  • SHA512

    4f9487a23889a61244c51de967aa5ff034dedf8495d6f17b3fce682c2705bf7065ddbf3d2483b90cf296a05e4cdb4218717f40f3a8cc74a1a36306fea58ddf54

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtstS:BbdDmjr+OtEvwDpjM8U

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-13_6f3a40934855f7e6eb3d53bbd59f7621_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections