General

  • Target

    2024-06-09_1a2eb1fa87f1c4041d155cee4a58e69a_cryptolocker

  • Size

    50KB

  • MD5

    1a2eb1fa87f1c4041d155cee4a58e69a

  • SHA1

    78e4d6a79cbbfdded9e1be8433db89b68f91bba6

  • SHA256

    b177ce7c9d3b11241d574b83e1644e664e673726c39c690fab7a0acde3592cae

  • SHA512

    9ab142c94c96e9c96b93febe73ee27b2dbc1ce72233b693d6758b2d83f1518ba9d4d0f5fb4d25a7558b8b61398de3fa6f1fe51065ed54d65489b3c67da7476f4

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mocb2:qmbhXDmjr5MOtEvwDpj5cDtKkQZQL

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-09_1a2eb1fa87f1c4041d155cee4a58e69a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections