General

  • Target

    2024-06-08_7623eef5b49c5b53a1fe996d169b8d9e_cryptolocker

  • Size

    64KB

  • MD5

    7623eef5b49c5b53a1fe996d169b8d9e

  • SHA1

    e3c5c2cdf0f5d4279ced2f99c72cb2811d4352af

  • SHA256

    6911afa60231a907e211167047640a4cd8bb73345d53b2420e9a2667d8db97ea

  • SHA512

    f077b7b731eed2d46df4cf5ddf526e10b0242d40ea3acfa65e0801f6d1d22bbc52758c48eaef15ee72c296de1eeaea7daca10aa4ee0d99a0d826c4fa36fafcb6

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsif:BbdDmjr+OtEvwDpjM8a

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-08_7623eef5b49c5b53a1fe996d169b8d9e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections