General

  • Target

    2024-04-29_b2cba78fd6edbe90ea72708cb454fa72_cryptolocker

  • Size

    46KB

  • MD5

    b2cba78fd6edbe90ea72708cb454fa72

  • SHA1

    d82856d23a406bb3d948f7df508beab94fbdb40f

  • SHA256

    ee109435830a459cb0a820a121aa8bd46e981575e047b97c2637cff00fbcd028

  • SHA512

    2daaa26b2730dcc0c2ac03924340a057c8d0334c0e309ddbb1268a9eed7885afba0bc2b4483ffc6d0018e0369d00582a33241860bd71f21cce636d69bf102118

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoL5c:qmbhXDmjr5MOtEvwDpj5cDtKkQZQVO

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-29_b2cba78fd6edbe90ea72708cb454fa72_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections