General

  • Target

    2024-04-19_f696b24e692d45015ca852e6a91c9795_cryptolocker

  • Size

    46KB

  • MD5

    f696b24e692d45015ca852e6a91c9795

  • SHA1

    47b10764c205b9aa1d612c4b081ab5177be8b318

  • SHA256

    5a9a3421b7f76dee15a9e2ca351362c78c404ee5ed790a9c15acd7cde9dbd6df

  • SHA512

    dc5cfce104c10ecce73df69e88680e26db2891377fc231c07a5d52af771fc71f337f4b6683eb2351449a20732a666e98f60a1b7f29fb59cb6510b03f9aeb32bc

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoAQ:qmbhXDmjr5MOtEvwDpj5cDtKkQZQB

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-19_f696b24e692d45015ca852e6a91c9795_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections