General

  • Target

    2024-04-05_4dcd10213e8d93351c6b627679cc098f_cryptolocker

  • Size

    48KB

  • MD5

    4dcd10213e8d93351c6b627679cc098f

  • SHA1

    f8c860c5d5a958d0d05e3af9d703511541efb16d

  • SHA256

    e1e6812104e3dae9371c95772466818e12e18a718b0feec5befd64ed2839b8b2

  • SHA512

    32ba452c64e917944767aaf5aedd17671261210f6605fad9f04423fbaf30f6c7c008f2562547f864b9dce0826421725ea46369ed8e68ed047a85d3cbcbcfe904

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6uMcB:BbdDmjr+OtEvwDpjM1

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-05_4dcd10213e8d93351c6b627679cc098f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections