General

  • Target

    2024-05-11_1f61d44a46789d960d67b2d8b41ffc0f_cryptolocker

  • Size

    47KB

  • MD5

    1f61d44a46789d960d67b2d8b41ffc0f

  • SHA1

    e9681a0fbdba994525c022557c674513e22f1191

  • SHA256

    431bcd67777538a8331151dbec2279cdbea3f7e2d652adbc6a750743b4d2e04d

  • SHA512

    58c6c40e72aafc41ad94ed8a3be4c6e9fb970071f4a9896e9fb9cb2d2eda46cc5c23e5b240996fb2c2c86ed352471e640fb3cbd52fcf4d849f42d433bc673e00

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoAG:qmbhXDmjr5MOtEvwDpj5cDtKkQZQT

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-11_1f61d44a46789d960d67b2d8b41ffc0f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections