General

  • Target

    2024-04-05_57aa2dfb2f97b82d1744ed42f377d329_cryptolocker

  • Size

    62KB

  • MD5

    57aa2dfb2f97b82d1744ed42f377d329

  • SHA1

    cf236e2f7b29522d0f9d1c01fcd3815d25ad523b

  • SHA256

    bcba9440c3615d8b421e749e1eb425f31bbc828fd7ced2244aa5b31d699d33e0

  • SHA512

    4596e15fd5bfff4d7a879811054b4232d06b8d6bb173912d36b83c4ae373494569ee39287ed07c19c569475dd9a9348876ac74f3729efabb7510e268215062cb

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgts6bD:BbdDmjr+OtEvwDpjM8K

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-05_57aa2dfb2f97b82d1744ed42f377d329_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections