General

  • Target

    2024-05-11_13ed9ca86ede7863e9b0c33ff835c572_cryptolocker

  • Size

    56KB

  • MD5

    13ed9ca86ede7863e9b0c33ff835c572

  • SHA1

    48e7a76817104f0dd8fb600c4a5d8fca81b9f936

  • SHA256

    0c5ca7fccef3674cde8c440462e45cc6fc624a2df27589e7546b1d25f049ee1b

  • SHA512

    df6d238dafde60f666402b23fb5b8d55b86bdb6e5b87ae2c7308e9bf89f8724302c0d4026bbf3ddedc96d0298d20bc5a7afab8cee20f67f2ad853e0b97028437

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6Impy8:BbdDmjr+OtEvwDpjMv

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-11_13ed9ca86ede7863e9b0c33ff835c572_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections