General

  • Target

    2024-05-17_bab7bef3c7e0f844b2ca6e00b738378e_cryptolocker

  • Size

    51KB

  • MD5

    bab7bef3c7e0f844b2ca6e00b738378e

  • SHA1

    57a2b05c8e122c5a7276b23ffd5979810f97803a

  • SHA256

    c0ba7034c3547904cd115f897573236384f272bfc59b23c42c9e8b8fff275a18

  • SHA512

    5d8361df1a80ed3d3a4d5d097ca686443fb2c7d06f82bf15af278427e5e1f62ed2a1726cfe899207e4aa9b1de8cd48dd984cc9a6523613fd97a2b54f2c850593

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoccC:qmbhXDmjr5MOtEvwDpj5cDtKkQZQz8

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-17_bab7bef3c7e0f844b2ca6e00b738378e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections