General

  • Target

    2024-04-11_444f3cb9c99a43766b529bc8d02692e5_cryptolocker

  • Size

    63KB

  • MD5

    444f3cb9c99a43766b529bc8d02692e5

  • SHA1

    5668ade3245072286dd10948ea993d1ab294723f

  • SHA256

    75347b5ff1e9dc37cd5605b5b98a1eaacc0df9f748bbdf2b2d9b98292d22a608

  • SHA512

    a7d1c05f80a2f48cdc234b6f05c5847994503c39c781a8a6d08549cbb731a291c0d36a66e86b3ffccc017e6cac1bd4a722351a3c960f22013342932456bb579b

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsX:BbdDmjr+OtEvwDpjM8/

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-11_444f3cb9c99a43766b529bc8d02692e5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections