General

  • Target

    2024-04-05_f9fe90e6a77615c74dd12a93b59ca133_cryptolocker

  • Size

    50KB

  • MD5

    f9fe90e6a77615c74dd12a93b59ca133

  • SHA1

    4f55ae44b7b41dc15f4095939c273d596e779761

  • SHA256

    bf82f1d019a47d7c85f03ebb5287282a0d0e404f80f252790931737c129810bf

  • SHA512

    2790b50b38e1f5ddb151acc2e4bf74e2e8b7130a144cb8b33c7085f9889931e6891e6e9a99471e34f11b54600499c9a14f414e969aef65e1b0c6c1c93bf3f1ef

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUvMF:BbdDmjr+OtEvwDpjMX3

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-05_f9fe90e6a77615c74dd12a93b59ca133_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections