General

  • Target

    2024-05-29_f384f4e215d625520bd5dbb8b5306a2d_cryptolocker

  • Size

    51KB

  • MD5

    f384f4e215d625520bd5dbb8b5306a2d

  • SHA1

    f03ab48e9fa75ce709ff293340234ff1808735fe

  • SHA256

    4caacd2b42a6a58baf09fd33139b52093f389a58017de7263b990fd2a19313f9

  • SHA512

    dc3c9188311ab31e5d9e1bce5a1f9829cdb04ba299a1535e3f6b5402aeba67b98b7393d8449cfb0e4f6bf0bbfeb0f2f8226b80c99212fd4f432e6fe983f28520

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MocCo:qmbhXDmjr5MOtEvwDpj5cDtKkQZQFo

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-29_f384f4e215d625520bd5dbb8b5306a2d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections