General

  • Target

    2024-05-23_f1ae0fa9760b7ad6b5d125336a5f462e_cryptolocker

  • Size

    64KB

  • MD5

    f1ae0fa9760b7ad6b5d125336a5f462e

  • SHA1

    154047e2c753022adb4035af55a092d0542627cf

  • SHA256

    48d0e77737b3ed9bcecae5a02188eb452d1ff96e2f56affec19ecc61cb8e6ffb

  • SHA512

    094603f2e8a2b472de4849b7d660c3c16d1e68a306702c9aa7973ae7b627013f90f96adf5c3940ebd1593dc146fff191c3e1f6da99c36d3d73b674b2c97c55ec

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsi1:BbdDmjr+OtEvwDpjM8c

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-23_f1ae0fa9760b7ad6b5d125336a5f462e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections