General

  • Target

    2024-05-09_d33dbb141399b934f3093d41e351f564_cryptolocker

  • Size

    50KB

  • MD5

    d33dbb141399b934f3093d41e351f564

  • SHA1

    81ba349c0d68bf437bebbe81e012382d3a811edf

  • SHA256

    05011cc408236621858887011c2ded67a474367ceab8446b7884520bdf87213c

  • SHA512

    2325599eb36ac01f6491fcbed9a3e980759fcf773ed1f59518f4a2443a7355332564fe990692ac244937b6ed7830a6de6c035714a8692209a4fee9b34efdc3d8

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoccV:qmbhXDmjr5MOtEvwDpj5cDtKkQZQzP

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-09_d33dbb141399b934f3093d41e351f564_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections