General

  • Target

    2024-03-05_4adf9101b7c1e74ed239c772139df52c_cryptolocker

  • Size

    30KB

  • MD5

    4adf9101b7c1e74ed239c772139df52c

  • SHA1

    7c5c5065af3390720a1843b399a06af34e46c188

  • SHA256

    515c43d9173290ef14bb6585f9808f581df718dde520b5107b9fedc32f044161

  • SHA512

    a3c8a944be88dc74522825cc7b946164721d9e60733514c2c6d5b83f34bbb9a20a0677ba73cdcbe7b92beb13dcb9fe50b3733b4306157f5997031ed19dc720ef

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tHZ:q0zizzOSxMOtEvwDpj/arq5

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-05_4adf9101b7c1e74ed239c772139df52c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections