General

  • Target

    2024-04-16_cc9f22a72704557343b89da2d4d4bbdf_cryptolocker

  • Size

    46KB

  • MD5

    cc9f22a72704557343b89da2d4d4bbdf

  • SHA1

    f5d5096a2064eddc41d795a0d6441a8d471b906e

  • SHA256

    b8e73f17c85c5350f7df4da62b90c7b3e0837a9bf4b841677d2cfaa6e4e8118b

  • SHA512

    88a85225edf2980e9329c53ddc0e8dbb7408f474fd80c41a6d5ada62a982d37c4156a7e70b281d6a29c71033e43f95ad36fddd75ac2a07fc8baff66b841c8fb0

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoAZ:qmbhXDmjr5MOtEvwDpj5cDtKkQZQw

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-16_cc9f22a72704557343b89da2d4d4bbdf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections