General

  • Target

    2024-04-10_ad458e32b4fe59afbc8f3ee11db92970_cryptolocker

  • Size

    46KB

  • MD5

    ad458e32b4fe59afbc8f3ee11db92970

  • SHA1

    8424befb627a6802262cb05f803cc356695c82fa

  • SHA256

    677821271ecac8a5baca61bc9016a046b53e680193131f85e2fa3c820dddba39

  • SHA512

    a127c28b414edea723638ddece4b9a66da31369b9ee54c3f5de8e911c5a0f8ef2a0a199cd650531c8021ebe4e74bc767b0203bf5201a1a89cc5510c07b869c21

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoLg:qmbhXDmjr5MOtEvwDpj5cDtKkQZQW

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-10_ad458e32b4fe59afbc8f3ee11db92970_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections