General

  • Target

    2024-06-04_56d6c4412e730ad72443f13ae8cb1f4a_cryptolocker

  • Size

    47KB

  • MD5

    56d6c4412e730ad72443f13ae8cb1f4a

  • SHA1

    f1c9287d443fbd22f42e7de843a1688c5a50d5eb

  • SHA256

    9b8b8f2475bc05ce45912a40fbc864b7500bd22a373ae56949d35f824b386144

  • SHA512

    499c7b37a56645f2d4d01b07603a7f3d7d78da1b501775b7f07a0916d7630817735b26964002543800d3b49f89f88a408c4e3485640eadeb3cfa5259717c9f40

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoLo:qmbhXDmjr5MOtEvwDpj5cDtKkQZQe

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-04_56d6c4412e730ad72443f13ae8cb1f4a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections