General

  • Target

    2024-06-11_f920f3897ddd72155a410cc65e8afd84_cryptolocker

  • Size

    56KB

  • MD5

    f920f3897ddd72155a410cc65e8afd84

  • SHA1

    b9b6ca07b80def313515e2eeb8f4404737efeb0d

  • SHA256

    f67688ce977ed1000228fbc00e426220742dcf54a2b474e4ae9208076fdebb90

  • SHA512

    9751aae38219ba4f343e4ab8aa4dd8cae4e908d5106869f496795f00064ba9677841f148785a9c4fcf75ec505e012f161161fa859457a994e17f048e6c854b5f

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6ImpyL:BbdDmjr+OtEvwDpjMg

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-11_f920f3897ddd72155a410cc65e8afd84_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections