General

  • Target

    2024-06-10_72dbc1e804a55245ada962ca356b5dea_cryptolocker

  • Size

    65KB

  • MD5

    72dbc1e804a55245ada962ca356b5dea

  • SHA1

    51be97ac4566fc414f9110a12153c174d5986d64

  • SHA256

    3ed143d20cc6fe67aaeab6e5304fedc45fdc425fbff025769d8c1b103d072d1d

  • SHA512

    63f5e037f286b6044d74841f1e2c2d491f1ddad2f9731cb9bd3b263db02a0da29a75169956ea3d97577bfe6fdcc99d18fe641f06f8f44f4ac60aff659c042b13

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsihrj:BbdDmjr+OtEvwDpjM8Y

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-10_72dbc1e804a55245ada962ca356b5dea_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections