General

  • Target

    2024-04-17_4a94e1687120020e32440d24ef6e878d_cryptolocker

  • Size

    46KB

  • MD5

    4a94e1687120020e32440d24ef6e878d

  • SHA1

    ef1da82ba1289ef8919e0e9cf32c2da59edf206c

  • SHA256

    8ee71ea4663b3dc8c605dff00ea7f2392ab2fab4f73b990c0c2829a4cb2fa96b

  • SHA512

    ec7a02f22a50a3b3db97547431f89906f9599276182288a1a43d5dda69edb07873b1bb3f0d0898f4b902a6496d6a82f269e56bd5dea20bf762b88f321b8b0b6f

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoA+:qmbhXDmjr5MOtEvwDpj5cDtKkQZQb

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_4a94e1687120020e32440d24ef6e878d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections