General

  • Target

    2024-04-04_3422a0e877421dbc65cd1bbf125d5103_cryptolocker

  • Size

    56KB

  • MD5

    3422a0e877421dbc65cd1bbf125d5103

  • SHA1

    013e79fce34450e14418a8b2d892b1829e2227ce

  • SHA256

    c6653a492a6faaef0e442313d31e432dbb25d88127071e663babe7336208c713

  • SHA512

    10dded96ff6571d916dbad1edb34bd7ce215154fdf91a8bbf38f5653be20148f085d034d81fffa9093a14e27370a8dbfeb664042f528704b8e26c08bbf17e403

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb617xS:BbdDmjr+OtEvwDpjMW

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-04_3422a0e877421dbc65cd1bbf125d5103_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections