General

  • Target

    2024-05-20_044b84970aed7ca47939360153f9ea9f_cryptolocker

  • Size

    46KB

  • MD5

    044b84970aed7ca47939360153f9ea9f

  • SHA1

    9a7d763863ee38e98f8e39cf5d6d02da0a276cef

  • SHA256

    743a31d0f91a64a35ce9987b9176821062eb6f9681752aa598eb306d80d114cd

  • SHA512

    2770e2e8a143b7400bcb1a19fa0d6b552dceb52de816eea99070b2268d5ca201ecbeeae2f0c7fcfb7339e705a333d2f65c0e19f989e93bfadc0dfe90a21c570e

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoLT:qmbhXDmjr5MOtEvwDpj5cDtKkQZQZ

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-20_044b84970aed7ca47939360153f9ea9f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections