General

  • Target

    2024-05-04_614559d4353b10b9552193bf85f58b70_cryptolocker

  • Size

    50KB

  • MD5

    614559d4353b10b9552193bf85f58b70

  • SHA1

    8f22a15844e7aeeb6675735e6177d7be68f816f6

  • SHA256

    27c8ad3a8e1ef5906826c548ba38246d194dbda90cc61e1db29af40e21b34ee9

  • SHA512

    1a6b68604d4bda9616b344754857bf7466f6ad7b5806fc03564358de945097f29f5b47d1494ede416187824820385e7e47364249c1d051e2e5b322cb1795ea51

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoccI:qmbhXDmjr5MOtEvwDpj5cDtKkQZQq

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-04_614559d4353b10b9552193bf85f58b70_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections