General

  • Target

    2024-02-12_5563e7e8f4902a4785121afe42e171cf_cryptolocker

  • Size

    46KB

  • MD5

    5563e7e8f4902a4785121afe42e171cf

  • SHA1

    510c647d1f431b3cc0df188462b7b795a879e960

  • SHA256

    bc6eadb089010235df76fdbd59cba77d58ab800abcf28411e277054aa52685e7

  • SHA512

    bc76990e967268185a0a4289f0da0c73bc21c2ca304451ef785e837214038e0e3f534276699d4469665dbcba8112800f723d57259e250475d9570dd8147f4261

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB6:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ64

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_5563e7e8f4902a4785121afe42e171cf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections