General

  • Target

    2024-04-15_2ed43dafbfa50c8dae7b15abe1623c88_cryptolocker

  • Size

    62KB

  • MD5

    2ed43dafbfa50c8dae7b15abe1623c88

  • SHA1

    5c50c67d9c9ca1f7c260c18df911f4a4dd647712

  • SHA256

    30ecd10d4f2f1311abe77973a557be878fe4b03f14efc3ff3c1d4ff67f76813f

  • SHA512

    a56d52186eb280c248dfdc9606b6314ac0cbaa321d36ba55cf6335a29ac4864074c1573891dec1451c82e5534297ccb4dd7e5050d58c91511a39716d335964cd

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiA:BbdDmjr+OtEvwDpjM8J

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-15_2ed43dafbfa50c8dae7b15abe1623c88_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections