General

  • Target

    2024-03-15_c9b7caad3a01b6b22392035e1ba07010_cryptolocker

  • Size

    47KB

  • MD5

    c9b7caad3a01b6b22392035e1ba07010

  • SHA1

    52ad8b138675ecdee0d658c4e92e67d4149fd2a2

  • SHA256

    451f3ff26a061fde0d21f2ddc1f5719e84902e2bed20198bb7bd72bdf31f2247

  • SHA512

    1215b02bf451cf9cd07ac95652f71edf7c88bfd8e39c6f22471d9e5cca1b8ede0b855d61c749aa7afa3462767b385d3763522fa670b170b877da1c352528d0f9

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo2p1:qmbhXDmjr5MOtEvwDpj5cDtKkQZQo

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-15_c9b7caad3a01b6b22392035e1ba07010_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections