General

  • Target

    2024-04-05_4f0ea8b606c79e39640964c859bd87de_cryptolocker

  • Size

    48KB

  • MD5

    4f0ea8b606c79e39640964c859bd87de

  • SHA1

    999cd197d6112ef9f2e0996b92d1ecbedefabbd5

  • SHA256

    3c799559f5115a2206386de1fb4fc02800bedaab15353ab23760be4a8a123c62

  • SHA512

    4b6f7ae48ba436d5be50fecd71a570969cdaa66d3b65be7a3f33a674ddc5f7c39f5d3284ad3f71577ae8b52739ddc7727c624db7c80c7b7574440ba85383a9ac

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6uMce:BbdDmjr+OtEvwDpjMS

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-05_4f0ea8b606c79e39640964c859bd87de_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections