General

  • Target

    2024-05-10_a0c3b6ec11e7f9494bc14d02b77e5278_cryptolocker

  • Size

    50KB

  • MD5

    a0c3b6ec11e7f9494bc14d02b77e5278

  • SHA1

    c3d0bfd867f777726a9103e76a6e406dbf4913c4

  • SHA256

    4d31c90a48620914b9e7f9a5d8962964ef455c6c71c35530400f3263613abcad

  • SHA512

    acbfae75381004242ec111874ae75b30740d9e335cbe983e1a8af33c40fdcd0655bcc538e29928b9edf6b9d1b05db801a957937c8e89310584e18d17039e88de

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoccT:qmbhXDmjr5MOtEvwDpj5cDtKkQZQF

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_a0c3b6ec11e7f9494bc14d02b77e5278_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections