General

  • Target

    2024-03-15_4abd9bdb02c2684ec1b1703074946b44_cryptolocker

  • Size

    55KB

  • MD5

    4abd9bdb02c2684ec1b1703074946b44

  • SHA1

    fb4dd8ea269aca8f0f0815bd096aa09e6b1ac1b3

  • SHA256

    5fa7ed6611d6d397b878272365f7a4775a3b13e9b331efe3df95d0b0032384b7

  • SHA512

    5b08f13bfb765b63a34cde2f3b13e0c338715d3090643abcd7724bd5d890f5fbafff08c34d999ad5da9debdee7830171ff0fe0eeb93a957d36fdf19503948aa1

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb617xg:BbdDmjr+OtEvwDpjM8

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-15_4abd9bdb02c2684ec1b1703074946b44_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections