General

  • Target

    2024-02-21_4c5450090ec79100cabeec988d342652_cryptolocker

  • Size

    32KB

  • MD5

    4c5450090ec79100cabeec988d342652

  • SHA1

    bda4359c15eb1c6909d207fb763e9a0f9f5802b2

  • SHA256

    b4710aee67cd5dbb4d10e1eff2f988779caa84c7b950e419787548d03d247c82

  • SHA512

    734f0a06d19db7a0d9db7910ead4edbd6a3115410b2a0175b6f61f8958c30ee6f512e8d791eef927bcf6fe7fc244ef32f1e72e57532dca6c77d876fd1716be49

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tHmNU1:q0zizzOSxMOtEvwDpj/arqcS

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-21_4c5450090ec79100cabeec988d342652_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections