General

  • Target

    2024-06-03_90e1a9bd4a7ead59a562269539e3a939_cryptolocker

  • Size

    65KB

  • MD5

    90e1a9bd4a7ead59a562269539e3a939

  • SHA1

    e65eb668875e72feb5571594d8e3ef3349c8e401

  • SHA256

    4bc916976724cdf232015a2514ceacc5b1becd3b718acf4182b92e492810afd5

  • SHA512

    3ec75f588fe775241d1ac3fd459a4367a75057f9ce3e813b60fc9f95b1522f83bed95f32d849dfc18fc5d343af3416cb1edee5d7860ffbf0924422cb5a3c1a49

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiN:BbdDmjr+OtEvwDpjM8k

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-03_90e1a9bd4a7ead59a562269539e3a939_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections