General

  • Target

    2024-05-16_f8c0d318e674c19e4731c72bb31913c4_cryptolocker

  • Size

    63KB

  • MD5

    f8c0d318e674c19e4731c72bb31913c4

  • SHA1

    892342717fe80016ceec8b59beb0714531f0ff60

  • SHA256

    35d2f1034f9f8af19f87c21882f47d131944e74aaab3d3eec974e4a8ea7e94cd

  • SHA512

    e50cb987cff7ffd6297cc0c4d5b2eda2fb85b9fdbaf36db0fd72d6e0d433e5d7f8515132ac37b117b4303d7d55e601a6c741f374f0d27a46099ef0b5d4042918

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiw:BbdDmjr+OtEvwDpjM8p

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-16_f8c0d318e674c19e4731c72bb31913c4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections