General

  • Target

    2024-06-09_b36fbbf45cec5fab42a9cdea1b9bed62_cryptolocker

  • Size

    51KB

  • MD5

    b36fbbf45cec5fab42a9cdea1b9bed62

  • SHA1

    daae82dbe7a075435fff701d66c8e955639f3799

  • SHA256

    917b2a3aa124f9aeac4a71145246750b515af7675650b309672c00fb47ec74b7

  • SHA512

    fd75325a41b08498a4192d25717485f7749bbbbb87403a73c4185fec1200557d5f13f93c81112f821608d42fd8d210d5f4a79a7673314c080d9cbb3e8adbaebb

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MocCb:qmbhXDmjr5MOtEvwDpj5cDtKkQZQFk5E

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-09_b36fbbf45cec5fab42a9cdea1b9bed62_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections