General

  • Target

    2024-03-18_414dc6d9150fa8f836771a73c18173e5_cryptolocker

  • Size

    63KB

  • MD5

    414dc6d9150fa8f836771a73c18173e5

  • SHA1

    0cea09973072f0b2dbef78463d90443628052ecb

  • SHA256

    6398e4b881e29380759bf40f713ef518a55d5298e3838306fada608c65fa88ed

  • SHA512

    eb79513994622c1aa0be7de00b6592a9c1d24d8314cb4269083e7ba95347b6610d9ba7ab1b1c450dd09bb7b061734a45208ec65512b63399d809c21d4bdbddf2

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsG:BbdDmjr+OtEvwDpjM8u

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-18_414dc6d9150fa8f836771a73c18173e5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections