General

  • Target

    2024-06-04_9163d7a3fe421e211f2cbd4080ac440d_cryptolocker

  • Size

    65KB

  • MD5

    9163d7a3fe421e211f2cbd4080ac440d

  • SHA1

    4c261e3d7d7fb485752cf188d8378ff4835fdb76

  • SHA256

    a35ec1b8b9ffe5a6c73f2bef4de58c732bcfce6c1da7429899aa537cccdceb46

  • SHA512

    2c876e34f520cbed1345da597ef31795fb4b188d86d998725582358d0c9ef077a9f4d11af54b536f6771f578722241fd741bae0568edbf16bfb088d22c2137ec

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsih:BbdDmjr+OtEvwDpjM8w

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-04_9163d7a3fe421e211f2cbd4080ac440d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections