General

  • Target

    2024-05-20_d9a1b11ab3bfd9e11c7031a0494693fd_cryptolocker

  • Size

    48KB

  • MD5

    d9a1b11ab3bfd9e11c7031a0494693fd

  • SHA1

    0a64e7485b5b4a347c7d0b32b8135002280efe40

  • SHA256

    0f6de5899a95e9007e41eb81f82c0814977120131ff12303691fd98258eb72c7

  • SHA512

    d73cf1209b37530dda9d77dccc33c0b66fee7093e700071b4864c9fd6dfeb128c17021de72fe2056c56fa841150ebef272f68c75a670966f38e9040ec21b56c2

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoL5i:qmbhXDmjr5MOtEvwDpj5cDtKkQZQe

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-20_d9a1b11ab3bfd9e11c7031a0494693fd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections