General

  • Target

    2024-06-12_d6b4d9c86dc2ac83fa317c789c719e4a_cryptolocker

  • Size

    66KB

  • MD5

    d6b4d9c86dc2ac83fa317c789c719e4a

  • SHA1

    743c6f6469fcfeb7d2e3e29d1bb3fc1f1ed94c20

  • SHA256

    cd4037fff7dcc8adc2c19cfeb2ae1c4db06a51b27ad1e48d142066b2cfb4d683

  • SHA512

    a8c30c6668ab6282a863bc697aafaad3fd4a338e177dad993a4ed9f25c999e12aea545d3f02ea31a4338014df02b437e5311e7cfc24acd9d640ac1a88005ae0f

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsijS:BbdDmjr+OtEvwDpjM8b

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-12_d6b4d9c86dc2ac83fa317c789c719e4a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections