General

  • Target

    2024-05-10_f02f711283f77fe4c7b45b1f675e11e9_cryptolocker

  • Size

    50KB

  • MD5

    f02f711283f77fe4c7b45b1f675e11e9

  • SHA1

    85f559fa60466dae9d20ff85f10fc16c2b3dd2e3

  • SHA256

    0701979d76c85413dd575fc84d980228c9f946f7995c0741bf0354186f487b77

  • SHA512

    5ce4f88355c667751fdf7cc61e1b7b4ae610d682ed56dbe58b94a47d5b8b59aea915b7f54ce5da6c838796097944d6f4ad1b99dbbc537e20145d4d4454f8082e

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mocc+:qmbhXDmjr5MOtEvwDpj5cDtKkQZQk

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_f02f711283f77fe4c7b45b1f675e11e9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections