General

  • Target

    2024-03-29_3574c9d4acd3ba017ae4b3037db3b3a9_cryptolocker

  • Size

    49KB

  • MD5

    3574c9d4acd3ba017ae4b3037db3b3a9

  • SHA1

    58d9221eb3a9787662122dbe7ec93b2f42b8439a

  • SHA256

    61cd253f173f5831b397a2bdb1d3f796c070964a3b4e92f0282d2afd988860ff

  • SHA512

    066429dd0cdafcd2ca4ecccd05809fb95e78e9f1cf2f8a50d7ad5a9c5339119d587f5d0d29098918f6c1f9505646dffc89b2bd47e39d5b933fbe7817cee7664d

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6Impyu:BbdDmjr+OtEvwDpjMZ

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-29_3574c9d4acd3ba017ae4b3037db3b3a9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections