General

  • Target

    2024-04-05_330bbf380e444b4086ab30e2269500e5_cryptolocker

  • Size

    56KB

  • MD5

    330bbf380e444b4086ab30e2269500e5

  • SHA1

    aa73c0e814981e630d956914195e14f0a1f4f95d

  • SHA256

    9cd7246eb3963accb2d8b9a9f7073045ae384c919e434e9c6bb0e9d83e544175

  • SHA512

    7d122d9fb4d77f2c85ef5340b3447bf64881d9e677becbf6ef63705e06036bcf88a4c514a2e60760d3309e71ede1263ea8005330a6c8d4bec447cdf8b9216ccc

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb617xN:BbdDmjr+OtEvwDpjMR

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-05_330bbf380e444b4086ab30e2269500e5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections