General

  • Target

    2024-04-20_d40e04da6c7a9218bf8304ca2ee74b08_cryptolocker

  • Size

    46KB

  • MD5

    d40e04da6c7a9218bf8304ca2ee74b08

  • SHA1

    105060dd29cf7639c6bec1c0763ed027939b1591

  • SHA256

    b565f0b279157f6d1d98832aebe970b6a80acf760f9ae7c98e0cd9b05ff4afcf

  • SHA512

    c636023046e2cc8fc85bc32ea5838dfd82436f0ae2316f0f971ab796ec18010aa7d2667954f9c93007e09c323b9927312fcf93abbd7f76e9321a991d3f8d8399

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoL5a:qmbhXDmjr5MOtEvwDpj5cDtKkQZQdI

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_d40e04da6c7a9218bf8304ca2ee74b08_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections