General

  • Target

    2024-03-10_4e979ef67405f0f6cd02b0aca7989ed7_cryptolocker

  • Size

    49KB

  • MD5

    4e979ef67405f0f6cd02b0aca7989ed7

  • SHA1

    6ce2a182346e13ac2fe80594dd2fc5b5db8c68ac

  • SHA256

    9369c73f5c515cba4b3d4af052500a9908b1c94294774d2926844a9a7356323c

  • SHA512

    6ce551464ba86dd8a45c7ebe7fdaa079df2f1e5ede47e1d144d400ce8f485491b5b02d19131555c445019bccf6330bb820571f3473eee961bb89f81d416984e9

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUvI:BbdDmjr+OtEvwDpjMXJ

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-10_4e979ef67405f0f6cd02b0aca7989ed7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections