General

  • Target

    2024-05-20_974dd5fb5973b018a1bb2ce7d97928b9_cryptolocker

  • Size

    64KB

  • MD5

    974dd5fb5973b018a1bb2ce7d97928b9

  • SHA1

    4a024f853f4c8f3c35c1f7d8098d8ca98b6412c0

  • SHA256

    9282f684f5fb9744debdde02313715fa02386f19ece78639337be0dcaf81390f

  • SHA512

    3b61f0119de4dfad61774b9d069b363f252d709333f52b7f23f69cdcb61e77b4b24f18eed6eda55b02aa7c58077191b50ca7985692e1584e7bb3510419232712

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiE1:BbdDmjr+OtEvwDpjM8l

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-20_974dd5fb5973b018a1bb2ce7d97928b9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections