General

  • Target

    2024-05-11_1f6fc85c111e6eeb6284b6c6809f8b83_cryptolocker

  • Size

    50KB

  • MD5

    1f6fc85c111e6eeb6284b6c6809f8b83

  • SHA1

    653986081fcb07efb50e0f8db9b0b9711d848c79

  • SHA256

    e839982481186df1858d36821362d765e12ffc110289f2c846ed929342a68bcc

  • SHA512

    859bc28a69377c473bdfdfab4b7d46f80535c3b6ee35283edc8c261982872e663a17c5ed609177e2545a01407f1107ee23b1f6517d4c01f2fe596b7407506359

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Moc5X:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ+X

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-11_1f6fc85c111e6eeb6284b6c6809f8b83_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections