General

  • Target

    2024-03-11_0d4a7e2015fa9d49e06c9590784e6d04_cryptolocker

  • Size

    34KB

  • MD5

    0d4a7e2015fa9d49e06c9590784e6d04

  • SHA1

    fa759e36b526ae5d890a6c7c2229c2b97762cdbe

  • SHA256

    0ec723ba53c477ec06b81857a1e67a1ce9fcda11a0bb2e814517daabf089c10d

  • SHA512

    9c823c8969cb741cab3a39c2befee179a3a1025c3ab2798a6ea8f52b292ebd3e6ec36ed3c7b37545a8bf2a24e1ee9d1eb4829698286993d80bf8a2ba96ecd5e4

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmotzIe:qmbhXDmjr5MOtEvwDpj5cDtz9

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-11_0d4a7e2015fa9d49e06c9590784e6d04_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections