General

  • Target

    2024-03-18_4e5e510c6e0bc7efd9b971a7d1c231e5_cryptolocker

  • Size

    32KB

  • MD5

    4e5e510c6e0bc7efd9b971a7d1c231e5

  • SHA1

    d5cd505af6f49ccf9aacf28db3db1a15edab9cae

  • SHA256

    5d32d72e044fd2f58372fa6b9346391974dee5533bd9ed6955e0a6ce27141976

  • SHA512

    7f469b3c2f69028da2149896e350875a47bbe63d9d448936a06877fca8cf1b4b3bdcddd36df53434d8afa75e7dc13a95d1539285e7c3d1ad4b1586bcaa4c7113

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tHbj2l:q0zizzOSxMOtEvwDpj/arqg

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-18_4e5e510c6e0bc7efd9b971a7d1c231e5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections