General

  • Target

    2024-06-11_59f47d0445a63b774713290d220bbaf8_cryptolocker

  • Size

    65KB

  • MD5

    59f47d0445a63b774713290d220bbaf8

  • SHA1

    f5afc68e34c5156f25515d0de9aaac75f37797a9

  • SHA256

    896416059934a177d0e608c859100205e9df9459ca3f9ab5b710650fe69e18bf

  • SHA512

    d37bbafc29850c1d698df534f6913da229e35bd86b2a4b670e0bfe10c956b86e5eb7afb8cc1611044b2d0139244fea6eae43f81734652138328fae13c215db56

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiz/:BbdDmjr+OtEvwDpjM8u

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-11_59f47d0445a63b774713290d220bbaf8_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections