General

  • Target

    2024-03-14_1e463e32cab3884cf05b96590d194189_cryptolocker

  • Size

    50KB

  • MD5

    1e463e32cab3884cf05b96590d194189

  • SHA1

    c9b98daf9e7aa92913e1302d4309481e53b3a68d

  • SHA256

    7649415b78d4b1ba468ebaa27adc712bde167e336525e61fd07f31239e4e8c5c

  • SHA512

    9c71cc874d460df132c30bbef95a17bd728e9c0063ad11ed0618887731103c67e8af1459f16e0a858c9bf22767656341bd6982c37767da16abbaa0c9033d203f

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6Impyl:BbdDmjr+OtEvwDpjM6

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-14_1e463e32cab3884cf05b96590d194189_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections