General

  • Target

    2024-05-20_4a5a7d5f2e360066f2ba3318f41cbb6c_cryptolocker

  • Size

    48KB

  • MD5

    4a5a7d5f2e360066f2ba3318f41cbb6c

  • SHA1

    96825c350b7d2bc46e788c01f7051cf1a6ff5525

  • SHA256

    c2fef7ca0c7e508cee153168b0b6060eb9c0ce2cf7883a0b4f808997c2632873

  • SHA512

    62c581b291cdc6698d1473e26f0d92e3e92b0631a610c942499ceb5758508347008fad51718fabdd17d4d402c7a4d31a4ea6b2a8dc6b58fc13cbd4aaf5d995a3

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoL51:qmbhXDmjr5MOtEvwDpj5cDtKkQZQV7

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-20_4a5a7d5f2e360066f2ba3318f41cbb6c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections