General

  • Target

    2024-04-21_1c9bc653829f3d5229674c095c3b8e70_cryptolocker

  • Size

    62KB

  • MD5

    1c9bc653829f3d5229674c095c3b8e70

  • SHA1

    2a8c75761a7f6a110dd06b1a8d451dae5a081011

  • SHA256

    1eea10b731a60cf879a2822a8ba2faf36388d47ccdf13d32a399ff1ce5ea8706

  • SHA512

    a3415975555f238f877bc76db0128b546543e996244085fdc0dabc24f34b766f870c8ddbb4ace6cfe94540906e712ce1defa4d78ed69fc556d798a49f7d366ea

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsie:BbdDmjr+OtEvwDpjM8T

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-21_1c9bc653829f3d5229674c095c3b8e70_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections