General

  • Target

    2024-04-17_f4dc3bb412780df88526625325cb8647_cryptolocker

  • Size

    49KB

  • MD5

    f4dc3bb412780df88526625325cb8647

  • SHA1

    491423cbcf1f572785dd36fbf831fb71c29446a7

  • SHA256

    5dee883af83b34be336af44381439d9fb3f694603e3dfd3a4476949f60f3c93b

  • SHA512

    c22b2f6a43d1b1d751bcef9237db8aa71766c978f82e95652b60b9893919cfc490442f944b1ad190d581a5ea87de8bf7df784c56eb227e51e4d89875381f74b9

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mocd:qmbhXDmjr5MOtEvwDpj5cDtKkQZQY

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_f4dc3bb412780df88526625325cb8647_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections