General

  • Target

    2024-05-26_33f278166568633828715799dbf3ee48_cryptolocker

  • Size

    46KB

  • MD5

    33f278166568633828715799dbf3ee48

  • SHA1

    29d3926b9380128e9d6cb0767080b8c28d872c09

  • SHA256

    e2a812dd933f1967a83a61fdb2e01bf76317c1e74f74ed0c444405d2c4ab5d65

  • SHA512

    c7c89b15cbcb25d1ef681c8477fd218e61e7fffa8fefe0f5f5e14658a41c7dcaab67cc62f7184f3061a47a0729c3fb1db49d3300c929941bc882056bf4d2c3dc

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoL7:qmbhXDmjr5MOtEvwDpj5cDtKkQZQR

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-26_33f278166568633828715799dbf3ee48_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections