General

  • Target

    2024-04-25_be6e1eba14823680b5d42a416d09e5e2_cryptolocker

  • Size

    49KB

  • MD5

    be6e1eba14823680b5d42a416d09e5e2

  • SHA1

    a0f12c7307a7e406df3c09b72ee2783d9bf2fea8

  • SHA256

    f900cb38db6d9a99dbe7f59b3ec0cdaa5a722d5430ee16e94afb60bb2da11896

  • SHA512

    f71e53d1e309015feb79e99034dc4556faf75e88fb0defba074c407275c2673909047199b6a2472bb0ee3c29893f85eb6028414e0f20369eb28b8bcbb972d6e9

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mocco:qmbhXDmjr5MOtEvwDpj5cDtKkQZQK

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-25_be6e1eba14823680b5d42a416d09e5e2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections