General

  • Target

    2024-05-20_8cb4966c14b16fa240c4555f5e801843_cryptolocker

  • Size

    64KB

  • MD5

    8cb4966c14b16fa240c4555f5e801843

  • SHA1

    f0af28c3b45ce803aa31c26525f417775e160e51

  • SHA256

    da222b202a8de573c71869b76885d0fb38b3f2d3786922d05a5ed295cc6bf905

  • SHA512

    b519d85dc673fc1231f52af0b75cf35a0f78cb72857533eaa9768cb9cfe40f4878f05f0ea18d072ccf050e9243d42d570c6e9bbd2e75a3dfcc6a13fa64026080

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsi2:BbdDmjr+OtEvwDpjM8z

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-20_8cb4966c14b16fa240c4555f5e801843_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections