General

  • Target

    2024-04-17_59bc8a9b81f9ddf8f855e43ae55f5a4d_cryptolocker

  • Size

    46KB

  • MD5

    59bc8a9b81f9ddf8f855e43ae55f5a4d

  • SHA1

    b793e42f6ec51a7a95c4a46707ef0e268d906a1d

  • SHA256

    58681e9658ad3952ae86246b5b6f6f3088132d8b733f0a00f5ec2287081581a7

  • SHA512

    f5a363b497008f6674471f3770d47bf44bbe8f9c2c084e565de3a3874d27335b0e999b0e3af5d42d575f9a05297b9b91d0c3cd139ba4795967ce43e0de6376ba

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoL5U:qmbhXDmjr5MOtEvwDpj5cDtKkQZQQ

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_59bc8a9b81f9ddf8f855e43ae55f5a4d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections