General

  • Target

    2024-02-18_b5e03d8ddb7d7aa8db7c6e2e1bdb33d8_cryptolocker

  • Size

    49KB

  • MD5

    b5e03d8ddb7d7aa8db7c6e2e1bdb33d8

  • SHA1

    b319dc05226e886c123612e230502b9e99162091

  • SHA256

    91aede8a777ae7227b0717da9be0b025322fedab6a7d8df4441adbd1a547a4b0

  • SHA512

    c4ff3cf324865863c2d4e4829a31a4d703a57f03f43502a387df302f7f63f4d7fc55109cb4c5fd4ebd45d45023162ce9d00a268eba0392fe14e5bd8ef27a9d72

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUv8:BbdDmjr+OtEvwDpjMXF

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_b5e03d8ddb7d7aa8db7c6e2e1bdb33d8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections