General

  • Target

    2024-03-28_b974fcdf32c14212ac96d697c150e723_cryptolocker

  • Size

    50KB

  • MD5

    b974fcdf32c14212ac96d697c150e723

  • SHA1

    6c1af66183128b4fe6572dfd12378bf8824ea4c0

  • SHA256

    ffe80d9ee39fc59d0534fc94651a44ca6487f6c5a3a25f4783d093a269849fee

  • SHA512

    d6bc193b748d4127de0242eccbed37cbb7ed7e360dc0b1bce58760c6a9538ac6ca8cec8e103275f2364b99e3cac770d9ee9cf0e29b14ecf852ac076e4338120d

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB52UX:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6uc

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-28_b974fcdf32c14212ac96d697c150e723_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections