General

  • Target

    2024-06-04_07b6e7d17d586d1227fceb9119ba0703_cryptolocker

  • Size

    47KB

  • MD5

    07b6e7d17d586d1227fceb9119ba0703

  • SHA1

    28203a1452c3110dc0b2f5b6da3540aa1733bfaa

  • SHA256

    50268fbe280604b96e58bff925207a8fd4375336386e8db9f096998b10566fb4

  • SHA512

    67ecb0ba27f95a78128d275775a7274d22d0456452e1f1ee9c2a4afb8cb4f66e6fdc067fb4cfac0e11bf3b07013c9502d3dc6558521d3281ca221b4021fd59dd

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoLr:qmbhXDmjr5MOtEvwDpj5cDtKkQZQB

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-04_07b6e7d17d586d1227fceb9119ba0703_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections