General

  • Target

    2024-03-20_c14b7f42d8f77708a225538285d7637d_cryptolocker

  • Size

    60KB

  • MD5

    c14b7f42d8f77708a225538285d7637d

  • SHA1

    27178133c110cb7adcbe8289b80861de93259377

  • SHA256

    7a166f93293752b5472deeb5d4de55ec9a251d889c3add91db4938085e02bcfd

  • SHA512

    76aa489cb0d14b5cf419430d8112d243f46f67398efdb2e9d82ff2806fe1f60f3db2e3eab1c4c84650fffebe201c4801140b3c64802f8ed0f46179f1d36d82f5

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiL:BbdDmjr+OtEvwDpjM8e

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-20_c14b7f42d8f77708a225538285d7637d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections