General

  • Target

    2024-04-11_802a0a3bb17f4e4860f74b4f16cc20b5_cryptolocker

  • Size

    61KB

  • MD5

    802a0a3bb17f4e4860f74b4f16cc20b5

  • SHA1

    1d6bac950b3ab15aa8c658a28aa62622cd1b6063

  • SHA256

    5b2d71fdbe0a941ccec9300cbe37712bf5922865bf0eb2b70b8777f6da9e36e5

  • SHA512

    4051fbef8fe2ddecd668ad3a76816993dc71254ed8c68f4a025d789f875734e13ca24c50a7613c7e5fbd362a11d345d5123c927595d7907d92e59809b0675d94

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiH:BbdDmjr+OtEvwDpjM8S

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-11_802a0a3bb17f4e4860f74b4f16cc20b5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections