General

  • Target

    2024-05-13_3625e9b26496772fac50f5f352d6863d_cryptolocker

  • Size

    45KB

  • MD5

    3625e9b26496772fac50f5f352d6863d

  • SHA1

    ae3f7ca999d7d45b21812641e8f48791b4c98660

  • SHA256

    bbdda0db9668f0198bfc467764666eb0ca7f0f5bd1e82c4d68fb65130e43d18b

  • SHA512

    9b6d67b6005591171e1165c4d3a592f5f9616d81be9bbac82bef3bb35e2c6965133c2fe4388d95e1a1838bc0981394244442c232f9107c8daf0b9399b7ad4370

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoL8:qmbhXDmjr5MOtEvwDpj5cDtKkQZQC

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-13_3625e9b26496772fac50f5f352d6863d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections