General

  • Target

    2024-03-19_63b4fc062f274fe0f3f841a75a5f2ae3_cryptolocker

  • Size

    60KB

  • MD5

    63b4fc062f274fe0f3f841a75a5f2ae3

  • SHA1

    acb6274de9c1036872299a3e958f30f0171836a1

  • SHA256

    0c133246c846e24275f19128d18cfff00f1c2f8b64badd1e8adc537492fabea9

  • SHA512

    e49c03950656442b23d977247940bbac56a388f8aa3a7f1b6cb8c7de63a5f0a4213a1e7a0cb6ea90266bf49e1e28d527a6815aa5cfea2c3b6c180759053ec0ed

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb614f:BbdDmjr+OtEvwDpjM8

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-19_63b4fc062f274fe0f3f841a75a5f2ae3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections