General

  • Target

    2024-03-27_51cb8b58e695f8ef7cff4a95e4486b82_cryptolocker

  • Size

    61KB

  • MD5

    51cb8b58e695f8ef7cff4a95e4486b82

  • SHA1

    a8b8640e055b317b7eb4d8cfe34eb6a104f1e2d3

  • SHA256

    1aa8c2c0deb0caffe7999cd1a00867375e79a8b4f0ec6672394d01cb036e23d9

  • SHA512

    4976ac881cc086bd054014a2412e0c2491815b54d9becc8bfdbba25dd48b10dd14fcf208e62cc9838b4cba5131200194f4bb9e8a39ff1e8cdeda595c4d26570e

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsir:BbdDmjr+OtEvwDpjM8m

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-27_51cb8b58e695f8ef7cff4a95e4486b82_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections