General

  • Target

    2024-04-15_b4a5f660c28f2c9c40b1317994bfde1b_cryptolocker

  • Size

    46KB

  • MD5

    b4a5f660c28f2c9c40b1317994bfde1b

  • SHA1

    7fcf57e397b67f40921a1c916b2889f8c561dfc1

  • SHA256

    bce557570b096dee52209536c21480ae553219785485b03bf111dfb735b44f56

  • SHA512

    a1a97e0d47d960abc604a2200b27657e86997328557c03f65ac7b636fb4bf86e5d72d2f2bd1cb942184b7f3b604323decb518bf7f9eed2006fbd39aa5a410502

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MobS:qmbhXDmjr5MOtEvwDpj5cDtKkQZQE

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-15_b4a5f660c28f2c9c40b1317994bfde1b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections