General

  • Target

    2024-03-19_922ae1ebd1be6e8f530407a60c854229_cryptolocker

  • Size

    50KB

  • MD5

    922ae1ebd1be6e8f530407a60c854229

  • SHA1

    342983570a319596ccc17ac0774255b64b570f20

  • SHA256

    80e3188b11bf46742bc10798a7cbf8013bc3e9cc7582f2c839a2a473f3944f93

  • SHA512

    c875e51385c072ae90879154c90999d358f3f42697afb5d1bda345baaa842ac1ff89f85674bccea2ad0deb8f24bb616d70893f673054938e8b32c4586f4449ca

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6Impya:BbdDmjr+OtEvwDpjMt

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-19_922ae1ebd1be6e8f530407a60c854229_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections