General

  • Target

    2024-03-12_4f5d130084e70597c5eef0d92b2565b9_cryptolocker

  • Size

    57KB

  • MD5

    4f5d130084e70597c5eef0d92b2565b9

  • SHA1

    e78a608b756d414e37e0f193554b5b04835292ac

  • SHA256

    9b5e29f8b18fefa9f82b16c09292cf22043842394b2435a5e1af3117a705f195

  • SHA512

    9d6f520b858008ea52cee32b5d2a0da1f62d9177fd1e1f3e0cf80a56f3dd7c14408726b9696f0e3fce46055e4a613e0c56eab0537a8444d9af1081082daf680b

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61R:BbdDmjr+OtEvwDpjMn

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-12_4f5d130084e70597c5eef0d92b2565b9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections