General

  • Target

    2024-03-14_b3e2c222bf093346a2d739662f3a903c_cryptolocker

  • Size

    62KB

  • MD5

    b3e2c222bf093346a2d739662f3a903c

  • SHA1

    4ab079d4c556e4564b137d62b7b518a866a9662b

  • SHA256

    2b7b6831226b34a08b904562efef0cecf06e74c4dc16aab7cc25d89b4f6fb89b

  • SHA512

    e7bd5c64f54814e67336e62d53e4368e0e2414ce2608b792d455ab15e223ef7dec596edf2739d220bd46b5fd3b14941baeb7335f0d2e5cbadb8040fef9bf84d8

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtstQj:BbdDmjr+OtEvwDpjM8K

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-14_b3e2c222bf093346a2d739662f3a903c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections