General

  • Target

    2024-02-18_4e11674902127f9a87b7b10e6efe499c_cryptolocker

  • Size

    31KB

  • MD5

    4e11674902127f9a87b7b10e6efe499c

  • SHA1

    a4603ad0cae1aba190d34b35ff5901783c135032

  • SHA256

    2d96f5b6d372906b9133d95fdab4fae10d32b6bbee740952b363c5b232b53f47

  • SHA512

    38b78d6c99169772cb6769c6b35e5cec665a9fc46f22199e656ca1c345d33368ba196b9c7a2e695402b5b8bcd8124025a8fc0bff0a2e41060cbde0eb45f8dd91

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tHl:q0zizzOSxMOtEvwDpj/arqF

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_4e11674902127f9a87b7b10e6efe499c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections