General

  • Target

    2024-04-10_172ec310f9753f799ce9a1b0ec9c6edf_cryptolocker

  • Size

    35KB

  • MD5

    172ec310f9753f799ce9a1b0ec9c6edf

  • SHA1

    88b7799bddc57bd9a7fe6c1cf87a37cf518a348b

  • SHA256

    5cccfc11e47ae06b8d101d97e7cde992f7fff11c761bec487c8fee24a8c5d7d3

  • SHA512

    4fbfa621fa573a181d810129cb82ceccc37445f99adc0ed5c2d7da8c5c9acc026eb396ae788e8e451ed44ffe327e6088d8c3ffa6366949f3c266653d17daf740

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoW8P:qmbhXDmjr5MOtEvwDpj5cDvP

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-10_172ec310f9753f799ce9a1b0ec9c6edf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections