General

  • Target

    2024-05-11_caca6640ddd2e699449535789266a622_cryptolocker

  • Size

    50KB

  • MD5

    caca6640ddd2e699449535789266a622

  • SHA1

    b3c301491bfb17656cd932514d1c8a8186046918

  • SHA256

    9ca1f6414a35e7f1ff5543555c049de5a537bd874dc7551904bc1de9ec36bfb4

  • SHA512

    4d03422d0eb363d5bd94e6a9844ab2c8336e9a54763c936fc226b85dc8be68c3ede5d35dc7ce0d8c2297c7e903dd3a6d13df16f2993711a8169e61884d07712a

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Moc55:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ+5

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-11_caca6640ddd2e699449535789266a622_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections