General

  • Target

    2024-03-12_ff401a4309bd08bf71924e4df52dae44_cryptolocker

  • Size

    52KB

  • MD5

    ff401a4309bd08bf71924e4df52dae44

  • SHA1

    47db414cd6a0423d526409bf50a2fbb3985630f3

  • SHA256

    4f2ff8715876d7ce90482e804256b8b06b6528b2112e2bc3e9c60be90e375076

  • SHA512

    0f50edb1ff46194d119f25ed8aa838d72e3a7f6a12391111eecbb9811d337982b794adcc548f464dd0588ca38c8daf1da811811872e473dd5a7b4f0e45a79896

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6Impyq:BbdDmjr+OtEvwDpjM9

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-12_ff401a4309bd08bf71924e4df52dae44_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections