General

  • Target

    2024-04-28_fab11d14df33cfd72ac71943b0f71b01_cryptolocker

  • Size

    27KB

  • MD5

    fab11d14df33cfd72ac71943b0f71b01

  • SHA1

    d1739cf23b64469fa90ccbabc6961b089af61b50

  • SHA256

    82d0832a3524ace8fdbe936f61a01061cb270731ef28ea791c5e19f751e037fe

  • SHA512

    59e6bab614494a49146db1644274583fb3f28aafa6cecb3f27fcc6da1ea8141a143a9298a749b178a10793dbd4a474c8791c1aa7c0e4c9917fa8bbba0d262888

  • SSDEEP

    384:qxOZzyjOnqGAs+8ULueO4NdE8tOOtEvwDpjqIGRYK1sGGYkxOqe:q0ZziOWwULueOSdE8tOOtEvwDpjeYe

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-28_fab11d14df33cfd72ac71943b0f71b01_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections