General

  • Target

    2024-06-01_9a152bf42ae3bde4e8e662086547aa79_cryptolocker

  • Size

    64KB

  • MD5

    9a152bf42ae3bde4e8e662086547aa79

  • SHA1

    5d0d4a25b8bcd5cf849cb789ae37701ea17b3f5a

  • SHA256

    8a554bbf47fc46a8e4ce4d875572f53869ceb57fb3b7ae127663bf2272244f5e

  • SHA512

    3c415d8f9039d211e6f35d1c89c79690b7c27ad069d24687bbc585fb460c7bdbe6cf3395663c5dc928d01bc36d4b36a6e1c8871c1fffce5d49cf11ec88f791f6

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsi/l2:BbdDmjr+OtEvwDpjM8R

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-01_9a152bf42ae3bde4e8e662086547aa79_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections