General

  • Target

    2024-05-24_070d3682ed8fb8f6021a3725f552ee19_cryptolocker

  • Size

    64KB

  • MD5

    070d3682ed8fb8f6021a3725f552ee19

  • SHA1

    8eb3f26506ce5aedf06f3c2a702fbea728542b11

  • SHA256

    eee251783953fef88dc3688a4594c61c2694b5b9ded31a21c0b209a8ac1e3adc

  • SHA512

    381acc021b6baf6c6ed0e10688fd62d2cccbb6fc28d2cb0ec834bdd797082bbe9eab03b86054e20dcb1556464aa4a72178aa3f0c3a142a356bee0f6214b9fc80

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiB:BbdDmjr+OtEvwDpjM8A

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-24_070d3682ed8fb8f6021a3725f552ee19_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections