General

  • Target

    2024-04-28_b3fc22f8f8a984958f1441081c52bca4_cryptolocker

  • Size

    46KB

  • MD5

    b3fc22f8f8a984958f1441081c52bca4

  • SHA1

    050ca6373e92a2157626ac2911cda98977232d6c

  • SHA256

    bfb9737de7c303c74d25f7d93e7dba537425cf3f5eac6ffc9188c9ce3284179c

  • SHA512

    147dd515b4401bdf2d3887c3c233c3c6e9f0fc682c40a13e3f77a29cf2b26cf8045e5ed8098c3c69be95c18e9618205b6da2d884c36b8ec5c0715d9675a936df

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoL55:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ00

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-28_b3fc22f8f8a984958f1441081c52bca4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections