General

  • Target

    2024-05-11_fb4b207d4cb8d8686a8bcbc2a96b51ce_cryptolocker

  • Size

    50KB

  • MD5

    fb4b207d4cb8d8686a8bcbc2a96b51ce

  • SHA1

    e91e2956456adb1047f315e5550b0031fad68bd1

  • SHA256

    a019ed37750318e97556839aacb8758ca0d73b7663b7af22d658d7b427dd106f

  • SHA512

    eb9561fc7c60ac72f24b2d0689dcf43fa59ead94f79df45999508fa7311a246be3870c2895631f0cd90d31cbbc87359a0a4a4ee4f240a1e7e071e76aea34d811

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoccJ:qmbhXDmjr5MOtEvwDpj5cDtKkQZQv

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-11_fb4b207d4cb8d8686a8bcbc2a96b51ce_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections