General

  • Target

    2024-04-08_217d4ea5882dae0bfda582ab6864ce58_cryptolocker

  • Size

    53KB

  • MD5

    217d4ea5882dae0bfda582ab6864ce58

  • SHA1

    d4d35e311381f8ab8519bf0fc43e0cac3f7f6030

  • SHA256

    b7b1f031e654b1514256b4a50aa134311419d8f467faaa3e7509753bed707afa

  • SHA512

    dba65fd09efc82994e06caaff14b906d27aec2e5f01525c2e636b45d8a40ebfdce33362ecf8637a955d2cde871ef143f6f31f6a7fb8a4bd23d6fcb7cd1311455

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6ImpyP:BbdDmjr+OtEvwDpjM8

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-08_217d4ea5882dae0bfda582ab6864ce58_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections