General

  • Target

    2024-03-14_f2bd0610e1f4e8cb370dabd1a519189f_cryptolocker

  • Size

    62KB

  • MD5

    f2bd0610e1f4e8cb370dabd1a519189f

  • SHA1

    cea9b5e8a2e158d173fad5c6070924b0f22147f3

  • SHA256

    21ac1bc96856880f4ce21ff1331a5eae954446e577da596f8ef5d0f06602b2c0

  • SHA512

    f70fba33d24785b9ed6edc7196ec41ecb0bdf43661cf54410cc8a1df88e3abc705c5d7d40bc2ae8e51071ff06fa6dc8186952275cedb201acf355c668c0be9a7

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgts6t:BbdDmjr+OtEvwDpjM8U

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-14_f2bd0610e1f4e8cb370dabd1a519189f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections