General

  • Target

    2024-05-10_a54dca312d2593711b8a1e84a3ba6003_cryptolocker

  • Size

    48KB

  • MD5

    a54dca312d2593711b8a1e84a3ba6003

  • SHA1

    f212db7ef26d1bb966c7c4f4a8108f0d1074a0fb

  • SHA256

    20d76bf782e9598d45097131245005683ae28fd0624bc911b5929c85db32c8ef

  • SHA512

    59fa4676a09460edca72efe04cb38af88214e51cc546e1b1f835b71f1e0aa2480eb92a651b6e363730c1a1b6a40503f00d1fe43f2f020f37cd6a4dc3e54e5c61

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo2pX:qmbhXDmjr5MOtEvwDpj5cDtKkQZQe

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_a54dca312d2593711b8a1e84a3ba6003_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections