General

  • Target

    2024-04-22_2677b9d2787f869dec82703293f34985_cryptolocker

  • Size

    54KB

  • MD5

    2677b9d2787f869dec82703293f34985

  • SHA1

    8f0d3a7dc5f2c1d244ff867d0f701ae160d87737

  • SHA256

    45ed4d88ecd2f388e1c9596b9722fa8c552ed103c91f3c437e5f2079cd7b1a96

  • SHA512

    db33ad909f97f8d250d254485809f3cce1ca2b900b86c24d87187da6afeb66bc6e60bb40abf82154321780b1d6fa85d53b7556b2852fec01044511dcde6ad114

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6ImpyM:BbdDmjr+OtEvwDpjM/

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-22_2677b9d2787f869dec82703293f34985_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections