General

  • Target

    2024-04-19_d10300e27b33ec9bff7c554ddf7feb66_cryptolocker

  • Size

    46KB

  • MD5

    d10300e27b33ec9bff7c554ddf7feb66

  • SHA1

    dd3c1f5f1fe5cf6661668cf90c71c065c4db72ef

  • SHA256

    7a5e5ab830e12a10c9a3ccdb948a4f0f3ba35ae521c59e5f6f3a22dfe863864e

  • SHA512

    5017004be363f7dab3cd97307c75d13b5fcb79f9a6964198b19cd4ce19cfd57039db0e4253ea26c51e437bbb58f8f4ca7e46dc74c8bdbc3f22a2921f286eb9be

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoL5P:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ7

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-19_d10300e27b33ec9bff7c554ddf7feb66_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections