General

  • Target

    2024-05-20_64a4d59886a369728cfa639e6d35c961_cryptolocker

  • Size

    64KB

  • MD5

    64a4d59886a369728cfa639e6d35c961

  • SHA1

    cb3450b7a61bfde9f1538ab5f1a2cbab8944cdce

  • SHA256

    c841f48e4325a69c00953abf663d55f6a906c97922a526aa287904d6d8c186d8

  • SHA512

    ba63fe180123bf682d96c1da96c11118ee36b65193b4afbb0f99df45474b11f3540268ccb069fadb565d03a1403989181eb81a405efa3c232f1eff24e972cf97

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsihw:BbdDmjr+OtEvwDpjM8n

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-20_64a4d59886a369728cfa639e6d35c961_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections