General

  • Target

    2024-02-17_5fb8a8f60128d1a40b4d54e489247f10_cryptolocker

  • Size

    59KB

  • MD5

    5fb8a8f60128d1a40b4d54e489247f10

  • SHA1

    1b2595c5854854dc0116b0ed3b18855deaf8b7c0

  • SHA256

    8f157bef8f9182b27e02ed403653623ee072405c77fd5c24a109eaf4121223c5

  • SHA512

    747c8d887c91d106d4d8b869e8a18172831ceeb7a5e05acf5678c9af74050debd4d17cf58990a39184891a7166957c09e5d522fe65386dcab82aca0dcea3575c

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgts5:BbdDmjr+OtEvwDpjM8h

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_5fb8a8f60128d1a40b4d54e489247f10_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections