General

  • Target

    2024-05-11_1392d42f91cc838edf1f4d82fd8191a7_cryptolocker

  • Size

    64KB

  • MD5

    1392d42f91cc838edf1f4d82fd8191a7

  • SHA1

    17acb89c07ca0c115661fe68101a618c14e50666

  • SHA256

    06b193aa7cafaf6255686c80e2242dad7525b73fd7f6924a52742eb915ccefac

  • SHA512

    5e52c48539d6d35a30a462807fb941bd725d5263cb984f07019a726776599e3c2005921ae1f66241f5b4c60c033b7ae086d970f96f272e41924d56518cc76685

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsihn:BbdDmjr+OtEvwDpjM8I

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-11_1392d42f91cc838edf1f4d82fd8191a7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections