General

  • Target

    2024-04-18_b3aa532cbc711a559572c9a9e23f0f46_cryptolocker

  • Size

    62KB

  • MD5

    b3aa532cbc711a559572c9a9e23f0f46

  • SHA1

    89af4ef0bd1c27c162a01690cc32c5aa92b4f115

  • SHA256

    319b035a772786e635673e28691cd904327b2bbc31f03ac43eac49f0fb776dae

  • SHA512

    89178fdcf4d9ed8165a019b5cbe9492f08f1da9052c4ea63b07e24fc9d734bb0368b3d21c3816880b28dacaf92e204e86d93a0f0d8b375f35dca0f21e77b557d

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsi7:BbdDmjr+OtEvwDpjM8e

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-18_b3aa532cbc711a559572c9a9e23f0f46_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections