General

  • Target

    2024-03-14_95e94bf1c9c312c925572d32b32a5ecf_cryptolocker

  • Size

    60KB

  • MD5

    95e94bf1c9c312c925572d32b32a5ecf

  • SHA1

    d248a8904b21e8388c15ac58c40706d3e021b580

  • SHA256

    c33c4fb041bc59735c3c7ae1a050912b82afa5ed768c64284ba45c53b704c321

  • SHA512

    6f4e4b9ec76f61dfea2a95ac2bcc0d234d19b8507d53c12dd8e6f949ba61daebff7d4fd163cf4875e807663713a02df213edb224ef2fe920abcdd6056f5051e6

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb614M:BbdDmjr+OtEvwDpjMP

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-14_95e94bf1c9c312c925572d32b32a5ecf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections