General

  • Target

    2024-04-10_a61ecc4e5da7d4f878ef70a5a6ab6d85_cryptolocker

  • Size

    62KB

  • MD5

    a61ecc4e5da7d4f878ef70a5a6ab6d85

  • SHA1

    e9f9fc9f7dc794e9b4523bf0c8970379d3dec415

  • SHA256

    6d50a04b6ad1bf976f0267aac20906df9ffa5748e7b4bdf50fc9cfe5524867e2

  • SHA512

    e5539dd0ac3db1710833a8a3cc4e0fb4ee3f2683be92f30d916d37cdd0fcd4e6d0c481064082d5a165f6eadbd16dab6c478d0885fd66c99ff246cdeb6640b951

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsd:BbdDmjr+OtEvwDpjM81

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-10_a61ecc4e5da7d4f878ef70a5a6ab6d85_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections