General

  • Target

    2024-03-19_327c4fd08306aeac53420a4b6da2fb49_cryptolocker

  • Size

    60KB

  • MD5

    327c4fd08306aeac53420a4b6da2fb49

  • SHA1

    1a18a0a92cdef9417a67e5c2d724ab5a5f5f7bac

  • SHA256

    53493c50a072dc8e3b4924c30db8a18b7e06566d4ffd3b0bf541b99690515145

  • SHA512

    8092143d2a288b12dd057758960c9476f10334efecf55020d5781744556096d07f40574329886fb02adfabd569ca8e5d6d605ed8a57aab1c5c291ecefc49f002

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb614Y:BbdDmjr+OtEvwDpjM7

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-19_327c4fd08306aeac53420a4b6da2fb49_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections