General

  • Target

    2024-05-23_a412f00535f88e91c6babd6bdaa7b930_cryptolocker

  • Size

    51KB

  • MD5

    a412f00535f88e91c6babd6bdaa7b930

  • SHA1

    1f6496fb68d4eef48db90887fb46743786aad67a

  • SHA256

    e52af4091dc180aa4ce0c9f80867af4b7fc381b62491d5f168d420823dfc0279

  • SHA512

    990ec4789ac5ec8a1378310d75eba48a6b52bc92e581801c1424202259b98ed835430c507bd3a9901e4c0746e1afd4eddacbe98d4e98d42bf8284f2907b6c079

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoccD:qmbhXDmjr5MOtEvwDpj5cDtKkQZQz5

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-23_a412f00535f88e91c6babd6bdaa7b930_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections