General

  • Target

    2024-04-17_6df714ef0fecc4b8677011001d9b7c7a_cryptolocker

  • Size

    46KB

  • MD5

    6df714ef0fecc4b8677011001d9b7c7a

  • SHA1

    088eb541fcb3a9647768e8a8085718bf1cbbfd81

  • SHA256

    43807025292b8115bdf6ea2081103698b2b867a58962280211a8297cbf9cdb14

  • SHA512

    e651d4ed4003c8d0ff0ede89e261af8492e4b4921845683d7feeeee12e1b3b54fcbca31afeb60e27d0e42580db6660e593b7bd011ed54b7b66979ff5e01ffa55

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoL59:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ5

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_6df714ef0fecc4b8677011001d9b7c7a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections