General

  • Target

    2024-04-15_7bc507bbb79073f1a913a3ecc09e245f_cryptolocker

  • Size

    61KB

  • MD5

    7bc507bbb79073f1a913a3ecc09e245f

  • SHA1

    4952f7276a7e4893c1678a97abecda87654f9fab

  • SHA256

    ec4c7e776c2b09b610852946c9c460618c8bd3760d82bf5e9cde6ab50c394764

  • SHA512

    b94c255ca8b32d1756e444c09d880a5806aa8c6f82c4d7e23004e4ec8a25d7e079937f1663a878cd3e03161b0f9037726f8623068457384b64a184f3e2ac4826

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiT:BbdDmjr+OtEvwDpjM8+

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-15_7bc507bbb79073f1a913a3ecc09e245f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections