General

  • Target

    2024-03-18_b86ec423f7de7ab01ca90fd5b04ed924_cryptolocker

  • Size

    46KB

  • MD5

    b86ec423f7de7ab01ca90fd5b04ed924

  • SHA1

    b3e39ae47e807713d84b2e36eb44ed0eaa23f46c

  • SHA256

    cd6b5c4e71064878f204843735319d590974637501bf8670654212647d9e5fc3

  • SHA512

    0e8629381d2e6e93b89eb8701cbda65b428c51f2d6923dcef431d3be2d41c597be2f6edacb83e019ad8b233a58e670fc56987b2704842ad315c953df234c240e

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoZQq:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ5

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-18_b86ec423f7de7ab01ca90fd5b04ed924_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections