General

  • Target

    2024-05-03_f12bcf8fb3d1d927a1d7f57cae162b44_cryptolocker

  • Size

    50KB

  • MD5

    f12bcf8fb3d1d927a1d7f57cae162b44

  • SHA1

    5c939148daa2fb6502b1e61c5acbf7d31c73672a

  • SHA256

    bb14d1756afadebf81788a24e3c15bee056839b478e26155d184a8f0e2cb87f4

  • SHA512

    47c657370c6d20f2ba5603d0a3521316101298f08b7a3f287fc722c2dc91e1c9a857a460c7afb8516860f4adbb182a9d60f1ede14a1d599192ec60ebe257864a

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoccT:qmbhXDmjr5MOtEvwDpj5cDtKkQZQl

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-03_f12bcf8fb3d1d927a1d7f57cae162b44_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections