General

  • Target

    2024-02-13_bd15679a33d45bc4a5013d62d84de10c_cryptolocker

  • Size

    46KB

  • MD5

    bd15679a33d45bc4a5013d62d84de10c

  • SHA1

    7c11ed9a3eacc357fc3f86f3f7c47939fef7836c

  • SHA256

    6f97e3c4db66318c3e3fbd2dacb9809ae585a8b6dfaab3511eb3e5f7e07ce6f1

  • SHA512

    cc7da3e7c80cd908ae4acb711ceebee8c4c9de779447bb864f39822ae116567503b54eff44d99d32bdfae4a054a6d2cb9cac9a223e137be9eeecd6d4a257d3c9

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoBD:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPD

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_bd15679a33d45bc4a5013d62d84de10c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections