General

  • Target

    2024-04-05_4fe45c0ca740458c0549b96e42e8b1c9_cryptolocker

  • Size

    31KB

  • MD5

    4fe45c0ca740458c0549b96e42e8b1c9

  • SHA1

    02f058f4b865260d28b0202bbf1c22c5f59e1392

  • SHA256

    b9e7c344b5efe0a2271d35669678250d8120cd0e1d701d2b2a6619cbace9636a

  • SHA512

    1c7e74a429ae764dd60e47cf20e7139fd3b693441bb40c41d36299ed708dea1e2189bd8cf754ba814ec7c31cc44696c944a2a7b6dd829051b38e194bfaa77804

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIO/xOcsTD:q0zizzOSxMOtEvwDpj/arMHTD

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-05_4fe45c0ca740458c0549b96e42e8b1c9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections