General

  • Target

    2024-04-08_39efde9bea4e69da10f11ae4b37f4a1c_cryptolocker

  • Size

    53KB

  • MD5

    39efde9bea4e69da10f11ae4b37f4a1c

  • SHA1

    d1e7cff156de1f89a9197cf5bf81ccc93686840f

  • SHA256

    7266a691a4f05b91d75169ed8e3df0a7f53a57c381b0c0dc678d238c61d781a1

  • SHA512

    2ffe5caa830fec04d73ee7fb5a07f039916043b9b7f9761fbe884dbdfa943fec4e5a961a08716dd5399095a6562da2106e7f08e110251a7f1cb91dbf165dd2d6

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6ImpyT0:BbdDmjr+OtEvwDpjMT

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-08_39efde9bea4e69da10f11ae4b37f4a1c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections