General

  • Target

    2024-05-10_4360be31cacb54b88477b7e992a1869c_cryptolocker

  • Size

    50KB

  • MD5

    4360be31cacb54b88477b7e992a1869c

  • SHA1

    d341d8d980d72bad6150f6ba8bf4a1d92c236029

  • SHA256

    7d909b6a83a5917fe5788714775c5bb49024c22fee194d5a65e8ac6d0500248e

  • SHA512

    989a671213df721f066ee356e8be1986c25ddda7de46f02ff585f5570d8edcc2402a8b877a41e7628abe0920c9adb9d5b89a39c33e704a3392fcb209c59dc25a

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoccR:qmbhXDmjr5MOtEvwDpj5cDtKkQZQX

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_4360be31cacb54b88477b7e992a1869c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections