General

  • Target

    2024-05-09_e4169243346c8c10dfc1febf06e59894_cryptolocker

  • Size

    50KB

  • MD5

    e4169243346c8c10dfc1febf06e59894

  • SHA1

    e5ba258f7bea511a6ac614343d744b6eee266381

  • SHA256

    70b9003c9056ff5840c277e311554ba10dcd39a70084b8cf45f98bd08e4ca434

  • SHA512

    77a9a977b66cca7adb5c9d2d72afec6cd6e60f72d68352b84293b24db652d50bb09c11d301542029e4483188313b79e18c827e076e12f114c5b66dcbc1cc9ef9

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoccT:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ/t

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-09_e4169243346c8c10dfc1febf06e59894_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections