General

  • Target

    2024-03-18_1c12d77959865d54d312af571faf13a9_cryptolocker

  • Size

    62KB

  • MD5

    1c12d77959865d54d312af571faf13a9

  • SHA1

    f042a44c7e79412b3c3548a10bf786fae4c6e618

  • SHA256

    6321c9f69c66f919c41e422df884a8be5739520033e1d1219f4b912cb196a019

  • SHA512

    b2a7c722c3890c9ffb63fbdfaa4dd786d5390fec922fc15f5b7eba5ae0906ce5f4e436c2df5444d98a3712b823a44f7523c1c9986f8f338ba6ae7069c57395ad

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgts6T:BbdDmjr+OtEvwDpjM8O

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-18_1c12d77959865d54d312af571faf13a9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections