General

  • Target

    2024-03-29_dd2f7562a43a89e3b3f1a1e6a4c60ee4_cryptolocker

  • Size

    48KB

  • MD5

    dd2f7562a43a89e3b3f1a1e6a4c60ee4

  • SHA1

    b4fe954017ffa17867b03114e568f3a02da5a1f6

  • SHA256

    2f155bfb3b23cf9f3ae283e123846ddb748d85850ef7b9fbe768d552d85aebfa

  • SHA512

    beff357f4895eee92bf46be09becca6467ec2a1ff0bc691c0c5bcc7a258bb7acd5e1a77eff95e6c34dd11c34377a8ec9d7091a12a36229a49f3481bf9115a917

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo2pB:qmbhXDmjr5MOtEvwDpj5cDtKkQZQk

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-29_dd2f7562a43a89e3b3f1a1e6a4c60ee4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections