General

  • Target

    2024-04-30_4d910eeafda2c08fa8393be987016f53_cryptolocker

  • Size

    50KB

  • MD5

    4d910eeafda2c08fa8393be987016f53

  • SHA1

    58d198e56c7f5b47d43541cc5d473ae457583707

  • SHA256

    dc113b607c75bc387bf940e7c0aaa703f57e106357a5101fa0e3c786a234768b

  • SHA512

    8613994c4972cd42ad4c0648e347c70cbc6d346a7549a8c85b0b41c6191e30cd47173f26357694890487e02d5665411472b30913c41bcb10ad353e4ba1ea053b

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Moc5o:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ+o

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_4d910eeafda2c08fa8393be987016f53_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections