General

  • Target

    2024-05-22_44f9b1be57115154447a8b768ebce321_cryptolocker

  • Size

    64KB

  • MD5

    44f9b1be57115154447a8b768ebce321

  • SHA1

    fe625aba3e480ae57f72fe5aac004acfdd4cc3bd

  • SHA256

    e7b4aa1b77f1b0bef1fe1810c1b8077f5797a0a1a7eb4af6436bdf3a6985844a

  • SHA512

    525c6236abbb454cafa291287f18359f57019eddeb6f26a3d999a061ad8b20e7c3a6814606f415437992d647b90c6dcc3831adf389890ae4e3f2a5f8e37afd7a

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsib:BbdDmjr+OtEvwDpjM8W

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-22_44f9b1be57115154447a8b768ebce321_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections