General

  • Target

    2024-04-29_dc7ae2c215fdce21ec0f8c2f137bcac9_cryptolocker

  • Size

    49KB

  • MD5

    dc7ae2c215fdce21ec0f8c2f137bcac9

  • SHA1

    c281558c2ede563874ab855ca760a06802b95a6c

  • SHA256

    1d9f86e9c2f885e6d59267e286ec00d856f51e3eff077b1795a1a9801fde9b94

  • SHA512

    6ef5a7434b9be8ceb00801977fe62edf08dd278729683c2b993b3914db0e0de9b9d4f067a8f3ac3f7548701526d017e75124c0a24058b7dbb533b424848af451

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mocb8:qmbhXDmjr5MOtEvwDpj5cDtKkQZQd

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-29_dc7ae2c215fdce21ec0f8c2f137bcac9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections