General

  • Target

    2024-05-31_b6ddf10ad7bf0d1e83a884808c71e04f_cryptolocker

  • Size

    64KB

  • MD5

    b6ddf10ad7bf0d1e83a884808c71e04f

  • SHA1

    39a562d1e4911c8c5fbf46cd7c91f8f510dab026

  • SHA256

    7030a703c4f10e1a298154664417e117cf25cdae3b504fba2965c93736d4ec83

  • SHA512

    4e2fa83869bf6f5ee06f2f31a7247dc387a31ad6415d01eeae31891358b7b7424b5a204631a4e68fca5a5cb0f787fbee2a59bc8c1ff249841245771f1ec1b9f1

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiF:BbdDmjr+OtEvwDpjM8s

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-31_b6ddf10ad7bf0d1e83a884808c71e04f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections