General

  • Target

    2024-05-15_69f44ce5235f11c20714263486ebe54e_cryptolocker

  • Size

    63KB

  • MD5

    69f44ce5235f11c20714263486ebe54e

  • SHA1

    f687a1d386e5218ad8afe472e4cbfb3530ded144

  • SHA256

    335f1e05b76bdd342d58b9cd54eb0c590ffd315b2dde3253546e26e9b4998979

  • SHA512

    8f3aaff87e8b4fb8358dcefa8cf2dd4665dc00357c882a5ba76d2f42409da4ce964e6f8908f60dbac33b502d1cc7a899d9b45b3e5611889b39f974200786db04

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsi5:BbdDmjr+OtEvwDpjM8o

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-15_69f44ce5235f11c20714263486ebe54e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections