General

  • Target

    2024-04-11_46183c29030a4af1bda6f6d659c537ec_cryptolocker

  • Size

    53KB

  • MD5

    46183c29030a4af1bda6f6d659c537ec

  • SHA1

    7585c845bd3ab6735b9bed9cfb315df52af98615

  • SHA256

    a16cf398dc36e040eccec3923c42239c8e16243d952ceaf839b45e95c514549a

  • SHA512

    a2131ba4677e9c46b769f0d5dedaadc3887e81c828be41b2c2489cdfc2e5253179b4cd5f2b2832ff2b5abb55ae8c0df984f0bc177a31abce6267fb091b9a0873

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6ImpyO:BbdDmjr+OtEvwDpjMZ

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-11_46183c29030a4af1bda6f6d659c537ec_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections