General

  • Target

    2024-05-22_bd9a1aef6b4471dc04fb47b03c3ab3cb_cryptolocker

  • Size

    46KB

  • MD5

    bd9a1aef6b4471dc04fb47b03c3ab3cb

  • SHA1

    f7518480dd8e7a4b8abbaf403fd880e31093a376

  • SHA256

    ae183a5c1db0d915b266f7c43fccb0b27cee4c893e9ac8ca9ffcb96ab360158e

  • SHA512

    5d04e6308db7fd1d737f4ba8720412b6a9f74864db286ccb08d47b243645837d43e20d7d68ad110d3afc6b67d36cf020cf5509a47b361c9e442dfe7487cc4ca7

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoLlE:qmbhXDmjr5MOtEvwDpj5cDtKkQZQk

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-22_bd9a1aef6b4471dc04fb47b03c3ab3cb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections