General

  • Target

    2024-05-10_756d43d0c0cbc025a5a08226d6cb093f_cryptolocker

  • Size

    63KB

  • MD5

    756d43d0c0cbc025a5a08226d6cb093f

  • SHA1

    65fc6fdb3c893f94457687b724bc2517b14b4e5e

  • SHA256

    830933af91f9dca4f86e61aa49938c029e99858624dab21be37008a4ced239c4

  • SHA512

    9f41a6e301b3ad20753592f746e23b7e41be3f09728b277dc9898d6b9ee7444c4d06cc34eb2dcf8a1674ccad61356f8016cc1b9f885b0fc56fec3783218a3a96

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsic:BbdDmjr+OtEvwDpjM8F

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_756d43d0c0cbc025a5a08226d6cb093f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections