General

  • Target

    2024-05-07_5a4fcf1671fbf3c53819f5507a70c97f_cryptolocker

  • Size

    47KB

  • MD5

    5a4fcf1671fbf3c53819f5507a70c97f

  • SHA1

    70f164ca9c075fb055d4e3a670ff90163cbe4bcc

  • SHA256

    864fd845f8e3c00c1919b3767a58aa537bfc6e501902203b726f4385f80f2562

  • SHA512

    5b9d254ede95a1eda70809a6d660c5a865e8b0408b63f17f72fefb9604293be8d1ee7b15493c4fafd36753360bda8aefedad092f28275e4c8a302fcd27f9eb26

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoL52:qmbhXDmjr5MOtEvwDpj5cDtKkQZQqP

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-07_5a4fcf1671fbf3c53819f5507a70c97f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections