General

  • Target

    2024-05-05_d442d0c6f3ec642e9bd46b305409ccd0_cryptolocker

  • Size

    50KB

  • MD5

    d442d0c6f3ec642e9bd46b305409ccd0

  • SHA1

    cd7aa1a5be1e2f3e9e2efd8f0fcad5bbcdbbc705

  • SHA256

    14a97954146f605e609a961969e9d6be6af7aecec80f3c95657ff01a8d49ad2c

  • SHA512

    b7a2700491ac0cae9cbdb1972ccad2d5259e2acae434c5b6de7d18342864486c5bf09b23a3c0edca18f6878fef28217d68b1a6471a118a6cbf61b4adc41fb249

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoccF:qmbhXDmjr5MOtEvwDpj5cDtKkQZQzv

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-05_d442d0c6f3ec642e9bd46b305409ccd0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections