General

  • Target

    2024-05-21_42d1ad3c862a1d4bf50a9e217045c112_cryptolocker

  • Size

    50KB

  • MD5

    42d1ad3c862a1d4bf50a9e217045c112

  • SHA1

    632ee34968e239258b47b9a10a237b280dc09208

  • SHA256

    90dd8182b945cc91c4a80491e780ee1a88336b6adc0cc271a677d89fad0cd850

  • SHA512

    a92ad153ec3a1d92eadb9cd50157519c4a564eeba1d329f7d726bd24362df1182c36e0cc6c0b583dd67cd4a2e6ffbf0e65983f1aa28847da328a64200844dd7e

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mocc9:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ7

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-21_42d1ad3c862a1d4bf50a9e217045c112_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections