General

  • Target

    2024-06-05_d1a31d4e740b3e90ed43d3c5d9c13838_cryptolocker

  • Size

    65KB

  • MD5

    d1a31d4e740b3e90ed43d3c5d9c13838

  • SHA1

    95f5ef3c1f726492d4a55adde72ad83de32dab0c

  • SHA256

    f533b531f7e465a112e32ff3001421bd89886571a4bc694b42eba531a39fd45e

  • SHA512

    8152dd46aa89a8a128d1ea74fc08fa40ace610d8fda1a219719e4a284ea2416fc4145147f597fa758ec4b01d2239b3663e9e7ab3f7fc6fc2dc11ff65e62790dd

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsi9:BbdDmjr+OtEvwDpjM80

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-05_d1a31d4e740b3e90ed43d3c5d9c13838_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections