General

  • Target

    2024-04-11_535ea7689bf086179a269a934904708f_cryptolocker

  • Size

    61KB

  • MD5

    535ea7689bf086179a269a934904708f

  • SHA1

    1a9c6914fc07bd1eb0bf7a829d02d5907fae1f83

  • SHA256

    16c653d725af68dcb06537b2b0c5fe6fa65d96b3eaac67e0222810841cf8e290

  • SHA512

    a1dc9055777f3ffecd0bd8e4b9b150885310658b016d581862fb92b69bcbfbd904c642d7b267fbd3a8f787d762d3abb80a3099b6104460212868a9368d18a4d4

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiK:BbdDmjr+OtEvwDpjM8n

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-11_535ea7689bf086179a269a934904708f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections