General

  • Target

    2024-05-04_7a2514c4523ac0f5188912f0b1c8b9f2_cryptolocker

  • Size

    50KB

  • MD5

    7a2514c4523ac0f5188912f0b1c8b9f2

  • SHA1

    ba063be0fc991eafceb1f98bd89496017d3476a6

  • SHA256

    0661a25628db91d51db0e8cb72da550738cd22af2248390ee90cdcf8ac36cb2c

  • SHA512

    803c71b8b8d6ec9a9622718881cc9cf0aef824315a0505761687ff9e852255617fd6667532d09aeff3a4e8eee86ce0950cbe5a759a1de140180c4b80b2d9b27e

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Moc5X:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ+X

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-04_7a2514c4523ac0f5188912f0b1c8b9f2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections