General

  • Target

    2024-05-30_59a1fc39b8bfb92945dc47812377bc47_cryptolocker

  • Size

    65KB

  • MD5

    59a1fc39b8bfb92945dc47812377bc47

  • SHA1

    9eacfb1e59c6a735be1bba3c5f21fb9a5a794c24

  • SHA256

    d681a92a53fad13666699c7b4f4289a8789051ca0dd16d2b259df3dafa24fdad

  • SHA512

    306d14dcd73cdd01bde97a86957216a39050c7ed601c5e36659e36999393fd0e75a6ebed99d0eff10b0d0b5d42eddc7c3c7728d62970b6cc696c6378b66da939

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiq:BbdDmjr+OtEvwDpjM83

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-30_59a1fc39b8bfb92945dc47812377bc47_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections