General

  • Target

    2024-02-28_1bf9ad3ab64015e425c1b45666e588e0_cryptolocker

  • Size

    47KB

  • MD5

    1bf9ad3ab64015e425c1b45666e588e0

  • SHA1

    5283ae9ce0cfbfbfdc88ba4ea4b79419c2c01be3

  • SHA256

    fc1d7fe9fde77ac98a2774ab2adb1c6c405616ee144a36ea6763d91b117b2d48

  • SHA512

    4af180f3c8398c0db724e06e8a21b33635488e91d6ca8346bd5621e2a2baf5751ca2d59462250fd9436dfc440331e2d38c701b987e755551ffc0d196e06387e9

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTBJQ3:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6fQ3

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-28_1bf9ad3ab64015e425c1b45666e588e0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections