General

  • Target

    2024-04-11_39f4360b16792dda20cb2ac5134c19e7_cryptolocker

  • Size

    53KB

  • MD5

    39f4360b16792dda20cb2ac5134c19e7

  • SHA1

    fb300f1a28c6ca3ce10c3d020323d4b82540488e

  • SHA256

    69be384c8229eef1939495520ef27728426cd780435dbf8c7d91f88e3675c517

  • SHA512

    cb35f62bbc78d4057472187c20f755446983853996c862cc7a7d7facf17533b9aedfaa0a7ad2e6acb646a48088978d3fd66f749c4f5fca44320f5d5c42857af7

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6ImpyN:BbdDmjr+OtEvwDpjMa

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-11_39f4360b16792dda20cb2ac5134c19e7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections