General

  • Target

    2024-02-20_bf6a11e709ac08c35c439f46571f33d0_cryptolocker

  • Size

    48KB

  • MD5

    bf6a11e709ac08c35c439f46571f33d0

  • SHA1

    2ee6f30d9258b50ee4b982c706ecb62f48d5bfb7

  • SHA256

    b7a6a41afb82f5c552ef914f37abefa2fdc66d22cbce4598cd5ce344dcde0a5f

  • SHA512

    11ec554265243f892a2817c778511735080163a12e2609477a3fe80573ae97f2668a50cf6e537830b2dd0b265fbec5e0b8bc5dc62166b345067ea78b091309ba

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB52zH:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6ur

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_bf6a11e709ac08c35c439f46571f33d0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections