General

  • Target

    2024-02-24_5bb83b42b41aa42297fcbc9b2b1f9f1c_cryptolocker

  • Size

    55KB

  • MD5

    5bb83b42b41aa42297fcbc9b2b1f9f1c

  • SHA1

    4a37dd2fe44e0aac52493c1f9dbd1b00fa3873e9

  • SHA256

    9fdc24e6a90a9d127bd8595e6d04f30d6f080fc394a0008ca1135ac443542374

  • SHA512

    d95fbc4d0d05d9ab5c4f2cebdec4b7847f70999856af4d098f07695dd43b54591e398257dc6747e6352661dfbe9c35596523b609420acb07d6bb503af0012d82

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61T:BbdDmjr+OtEvwDpjMF

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_5bb83b42b41aa42297fcbc9b2b1f9f1c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections