General

  • Target

    2024-04-18_4f5e0f3f01ef2964581e40f16fc7aee3_cryptolocker

  • Size

    46KB

  • MD5

    4f5e0f3f01ef2964581e40f16fc7aee3

  • SHA1

    86d3a1052c14478de37c0f56b2c2ffbed2a683f1

  • SHA256

    73f8d5ee37978dbea441147378c917e3b818f3f936607ad2393423b4b5440049

  • SHA512

    a1eb9797cb88ef85a2649529f6dc1a79f200752fb7894d5fb4354c2a7bf05b074c00c2a1d5be0b43e714662f054639d776e51567e33166e2b095dad614fa8c45

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoAs:qmbhXDmjr5MOtEvwDpj5cDtKkQZQV

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-18_4f5e0f3f01ef2964581e40f16fc7aee3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections