General

  • Target

    2024-05-17_07d14cd02e14969c6b51bc7c273132c9_cryptolocker

  • Size

    50KB

  • MD5

    07d14cd02e14969c6b51bc7c273132c9

  • SHA1

    c501483996709c315f0d7968b190274450a6d053

  • SHA256

    5d3c9106a130e193a771ad10f6b497fdfb8d14ae4e6b24e8d9e4a371af2da4d8

  • SHA512

    8cd34602cebd8d7d62a7b00dddee5abcdb91aeecfb45a4dd8582c2193a0e04441fe596f6a9d5849ca40ea09524a8faf4121801e839173e424578fd047be16b94

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Moccm:qmbhXDmjr5MOtEvwDpj5cDtKkQZQs

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-17_07d14cd02e14969c6b51bc7c273132c9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections