General

  • Target

    2024-05-11_6267d2684e1ab4072717c7be101c1b2c_cryptolocker

  • Size

    63KB

  • MD5

    6267d2684e1ab4072717c7be101c1b2c

  • SHA1

    27af0ed0934d871dc80d1413f6c21d16241fd5e4

  • SHA256

    cea259e81e302e4a8213011c0a82a1cd8a02043bf8bcc75cff97550f29f6259d

  • SHA512

    34a1c46371608ac83bd4315a404edc071b67f1dae927de3af43173f83f2136ca93471d64313412a2b680d30f16f2b265147c9bd6b78da45080f4dcd5db535b5a

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsil:BbdDmjr+OtEvwDpjM80

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-11_6267d2684e1ab4072717c7be101c1b2c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections