General

  • Target

    2024-03-19_4ce3d310582760fbbd57ffc4803767f4_cryptolocker

  • Size

    62KB

  • MD5

    4ce3d310582760fbbd57ffc4803767f4

  • SHA1

    5144bd32f297f2edd2c7434c95195175ca43962b

  • SHA256

    3e4310251eaa9fc314f6934601123161c8bba8cba8f300cb3118b4e3078031df

  • SHA512

    6ed1c0acfcd002a44e7e8b064acf7c9ad53cf7472ea84eb6f5f15d070f74db6c308cfb5b1d5c7d4ce812f6883b5df6ab2d1a86fcc6951be28286f130dfbba09c

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtstz:BbdDmjr+OtEvwDpjM8x

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-19_4ce3d310582760fbbd57ffc4803767f4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections