General

  • Target

    2024-04-22_d126f1c58c4ee3c5c30d253441b761af_cryptolocker

  • Size

    62KB

  • MD5

    d126f1c58c4ee3c5c30d253441b761af

  • SHA1

    52f0ed31d13795e28d5b1fbbd11bb39d1e82f961

  • SHA256

    6ca8b989e8e221767568d4ef994225d9d703844d07210f539c4d72416b8dae23

  • SHA512

    835d4286ebecc2ff9c905b9a5fcf6d144105584af78fedef79ab8327ec94946b52dfd50b18fb413546845d346aa4553194f2b0bc244170793b68ef67866611af

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiEE:BbdDmjr+OtEvwDpjM8K

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-22_d126f1c58c4ee3c5c30d253441b761af_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections