General

  • Target

    2024-05-10_dadbff8e1176650b9e5f5d79edc30d94_cryptolocker

  • Size

    50KB

  • MD5

    dadbff8e1176650b9e5f5d79edc30d94

  • SHA1

    ddff5308129b7183b9295fc37d8383c9b0ce34fb

  • SHA256

    ca1956392986f205969bb5e02a82bc197455375e08008f9c30372ee81faa9831

  • SHA512

    34c3b1152e438934d9e0618bfc91a2cbfaa2660abd1413db18b85cca2589d5b01e86f0adb0c8f2ac7df33e4f0699c253d4a6b756121ec587021d4505bc7411bd

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoccK:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ4

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-10_dadbff8e1176650b9e5f5d79edc30d94_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections