General

  • Target

    2024-01-19_5b152cf494966776b10d8ccd9e0d50f8_cryptolocker

  • Size

    59KB

  • MD5

    5b152cf494966776b10d8ccd9e0d50f8

  • SHA1

    84f3c78a93f56d677b912effbc779ca20762e96a

  • SHA256

    8f06e701501ca319d5a169e8660084ade966d0abdf30a3d6cab202f50dc5c5a8

  • SHA512

    c0411d1e36483e1eabdbbaafa5b282a4751727bb0e406d53d2deb1fc800f4be57c756b9ee37b6aa2b1a4c5e1f19dce1725c06d6b441343a8f68b362d518e6c35

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsw:BbdDmjr+OtEvwDpjM84

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-19_5b152cf494966776b10d8ccd9e0d50f8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections