General

  • Target

    2024-01-23_4c4e4fbb9e6c1a5b269e9bd28aafbc03_cryptolocker

  • Size

    48KB

  • MD5

    4c4e4fbb9e6c1a5b269e9bd28aafbc03

  • SHA1

    bd175bafeebbed83d50aad5e341f45a8dfbf9a49

  • SHA256

    89cf3a7b8f2347e5925a31ce3d65f72fa03edec471b1acb74d232bbb87f1924a

  • SHA512

    6fb4f1243d9b92c024040b91362228b32d5eb6cce7512eaff2404af07ad26bcd9e8b971762089023444f3dee85cf44ec1f1aa90733ddef07a9f4023cf7e7ea5f

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB525:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6u5

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-23_4c4e4fbb9e6c1a5b269e9bd28aafbc03_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections