General

  • Target

    2024-05-24_8d4c57e2b787b38a07710a1886fd6b99_cryptolocker

  • Size

    64KB

  • MD5

    8d4c57e2b787b38a07710a1886fd6b99

  • SHA1

    a90d2059466dc47c7e4e44d70f99d108dabd5cc2

  • SHA256

    6d39fb0849ca45f56798a4678ebf004cb73b0a3906b73722696a99adfa35b70f

  • SHA512

    db7e657065af0c3a1fa1427251a91c5aac3c838b939eb49fd721f5747bb3bb62b519c793b2d7d37d9e51438218d4f6e83d36343d67d141625e43f3481f9f7c7c

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsi2:BbdDmjr+OtEvwDpjM8T

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-24_8d4c57e2b787b38a07710a1886fd6b99_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections