General

  • Target

    2024-03-07_4e6d8431fe387249b7fe0cf91fd689bf_cryptolocker

  • Size

    46KB

  • MD5

    4e6d8431fe387249b7fe0cf91fd689bf

  • SHA1

    ee4e89835c4b121330bec00a8788b0c6f29679d3

  • SHA256

    58fb7838f02fed4b33ce5d394210c9f07c9ff6dcc0454f891e0e4e20ea11522e

  • SHA512

    5a36df6a3cfc0c24c0ba6d40b9847ec437a13340151c65b6faf20927a9f48cf39e92b52a2229eba96441d9e396fbbab261c41df86c319cdaa14c49ae29e02513

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mobej:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ+

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-07_4e6d8431fe387249b7fe0cf91fd689bf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections