General

  • Target

    2024-04-05_42ca0c349e202d4241a3d90f7db84206_cryptolocker

  • Size

    62KB

  • MD5

    42ca0c349e202d4241a3d90f7db84206

  • SHA1

    8496765aed224e3e5ea132d1a6ce9a57fe655fe9

  • SHA256

    50c19a5958cf53d142b33b3f79b61a7916fcee917b3e7a69fcce9850d11f5c4e

  • SHA512

    84944d318a6f965b73b8b44680d4ad1ca7e1bc26045df7c78f1ad241aebbeb0ebc24b0f7f7bdcf97ade2c5b26f37784191fc2dc896e5513e7d83a077adf78eeb

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgts6bD:BbdDmjr+OtEvwDpjM8K

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-05_42ca0c349e202d4241a3d90f7db84206_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections