General

  • Target

    2024-06-09_f417a9b6a49e35572fbe3fbf322bdfdf_cryptolocker

  • Size

    65KB

  • MD5

    f417a9b6a49e35572fbe3fbf322bdfdf

  • SHA1

    4486c6d792f792dde5309fdf7bc2b04963411f17

  • SHA256

    717732f00074a4531b271f54f2272a2d3af5ba7e847a028ffe9f97b13122c974

  • SHA512

    b0140e361f6215fff48de9f207cdffaacc1e12c7a183958df7c34b735ef42516e1a02b7abd2b50ad6fb865a87e941bb84ca9a5f32e41cb3fd43acf27a0d46013

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsif:BbdDmjr+OtEvwDpjM8i

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-09_f417a9b6a49e35572fbe3fbf322bdfdf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections