General

  • Target

    2024-05-10_1d3be83e746e7fb9c9fffdc647637a96_cryptolocker

  • Size

    50KB

  • MD5

    1d3be83e746e7fb9c9fffdc647637a96

  • SHA1

    7302dbd0d6cf4c9a509ca4e8117bb9278ed5ca93

  • SHA256

    71e9e8ac81bbdb3a14467a22d7e6731f6d726fabfce3018a18e14e2ff1711c65

  • SHA512

    ab1cd0eff05464765faea0a0f2ba4d0a7c0109c1cca15af2116e3a7e9694f784e02f05b46d4bbceda4ed41d28e5593c29c8295f2e03e346f3b9631673681a4c9

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoccB:qmbhXDmjr5MOtEvwDpj5cDtKkQZQX

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_1d3be83e746e7fb9c9fffdc647637a96_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections