General

  • Target

    2024-04-20_f5fe4c50ab9d58ca69483d2191dcea13_cryptolocker

  • Size

    46KB

  • MD5

    f5fe4c50ab9d58ca69483d2191dcea13

  • SHA1

    969a35d502f2e6794f527c8371e138450a3356b3

  • SHA256

    d30663e8c3b4d2ff49527f9333b3f39230459f2bfa5331125372a8678788efe5

  • SHA512

    f074266f266e252368eca7860e614b8225fc34cc77a4951d8dd09eacbf6d0990b557f9b81a97f476dfeacbeff6d1e2bbbe919e2014fb28dd1c432f2b4d1b8e45

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoA7:qmbhXDmjr5MOtEvwDpj5cDtKkQZQm

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_f5fe4c50ab9d58ca69483d2191dcea13_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections