General

  • Target

    2024-03-19_702b9cef65a7f04dbc28e01374bd203a_cryptolocker

  • Size

    62KB

  • MD5

    702b9cef65a7f04dbc28e01374bd203a

  • SHA1

    2eec3bff3ab043d16ea19ca1c27f754228238a60

  • SHA256

    d3545b9768c3e616d2f41f1462f4a9079fc2feb18fea2e1ffed9d56bdc6b6cb7

  • SHA512

    35796a53e32f2ad1e719dba63e45e987563d52e86f0b4ded34747159697ff060e455daacec76c9e2497841ed42f19841ef6e66cf23ec42f0d3be3c7b423a2a15

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsto6:BbdDmjr+OtEvwDpjM87

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-19_702b9cef65a7f04dbc28e01374bd203a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections