General

  • Target

    2024-06-09_44043c6c2c69407d4dc4d07d00b56ccf_cryptolocker

  • Size

    65KB

  • MD5

    44043c6c2c69407d4dc4d07d00b56ccf

  • SHA1

    d0a7234bdfc038bbbd5b27edc3d1b1d6de2a4f40

  • SHA256

    d323dea6b3a33c81e5d411a8ee13472de0197e47370ee9cb653e9d02e40c8fd3

  • SHA512

    9383654e91f0a0020ddaa699658a38c98e8b75a5b03576b798a9fcb68452d08723f09832b9a5a5bd6e971810c91feea6a314d48c6b23f9cdc136cc18102a701e

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsihrz:BbdDmjr+OtEvwDpjM8I

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-09_44043c6c2c69407d4dc4d07d00b56ccf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections