General

  • Target

    2024-05-14_b71638ed12e6384850f0b99e71d0772b_cryptolocker

  • Size

    50KB

  • MD5

    b71638ed12e6384850f0b99e71d0772b

  • SHA1

    4bffb8f43e5bb6e77a4e3f1881301eff599b1139

  • SHA256

    d81c6818baf10386f0c105a2bad2eb84dc56ae5a32526c2d94672932999969ff

  • SHA512

    924c02092d9795b58ff0cf02d61edbbab524a73b07d37e74af376d0e2227a4ac1353b6dd32dc14c64eeaa221b7ea1273f9ef312f67820c80e1f39318b0dfe6dd

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoccG:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ8

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-14_b71638ed12e6384850f0b99e71d0772b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections