General

  • Target

    2024-04-17_356476103d1113601b7261baf481d9de_cryptolocker

  • Size

    49KB

  • MD5

    356476103d1113601b7261baf481d9de

  • SHA1

    025f50cfc44b434311463ebccfe223333515e0ca

  • SHA256

    0df62e99eb1e860aeec91f84cc69fd451c1ac001b98562a0783cda1bfe0155ad

  • SHA512

    6fd7ce8fbb88cfdaf02d24a6faf97b878ee5d9a6608b147488c2acc46b8bca8b3574df0f0b628ee2c5e03b1b8b91494403b99c430eda1f242052abbb62800a1d

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MocW:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ/

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_356476103d1113601b7261baf481d9de_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections