General

  • Target

    2024-04-10_814a320ec3822023cb993d6b4a526988_cryptolocker

  • Size

    46KB

  • MD5

    814a320ec3822023cb993d6b4a526988

  • SHA1

    2a323a3ae0d7653956d38d413a4493ec8141cb02

  • SHA256

    24b97725c32fb466db9eb25248e22f078e50f73537a7b64a607d7e42d0ebdac0

  • SHA512

    4e2f36138c2ba13b825e594129ccd0309763b0aa9b2431ddc3ac067ec6268c3e4b62e51d68eaf56ef5270cdb11d3bf6ff16d821cd35092d27ac21f54b05e140f

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoL5i:qmbhXDmjr5MOtEvwDpj5cDtKkQZQu

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-10_814a320ec3822023cb993d6b4a526988_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections