General

  • Target

    2024-06-10_44ac64094bf28348bc9a6f2ece2e5b9c_cryptolocker

  • Size

    66KB

  • MD5

    44ac64094bf28348bc9a6f2ece2e5b9c

  • SHA1

    77af83d262fca87df5fa6636358026ef449de738

  • SHA256

    4b8b13c921147ea7003fdeb8b5d08707bc00849accfbc6b7ccbd7fd4bdc41460

  • SHA512

    6a01846ca95a326937423b63611ac293a8f4a4a8f7a0adcbb66b58b3c0d18d4078f8d9d5cd13627c5122fabbdd48ed55df68f1948b9807c5a093520b9fd4f2b8

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsijg:BbdDmjr+OtEvwDpjM8d

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-10_44ac64094bf28348bc9a6f2ece2e5b9c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections