General

  • Target

    2024-04-09_7994377ea96e0ddf39dc3d87d713b0e3_cryptolocker

  • Size

    61KB

  • MD5

    7994377ea96e0ddf39dc3d87d713b0e3

  • SHA1

    eb48d1b5c0d1ba33014f09f8841d2c0cb7a1c9c0

  • SHA256

    a7a9570b4b7e59c4c4ca35dddeaf20ef70860c4de811fba088fa01db025e8432

  • SHA512

    74e003315492010a56383b9199b0b11e814d56b64f13824092d5cb0bd9e0b00f1b4e15b339329063832199795c7614988559393bb1eb9dceb02f87c1cb09c31a

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgts62:BbdDmjr+OtEvwDpjM8r

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-09_7994377ea96e0ddf39dc3d87d713b0e3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections