General

  • Target

    2024-04-18_20a745b12d0e3865b755fb29433b4929_cryptolocker

  • Size

    62KB

  • MD5

    20a745b12d0e3865b755fb29433b4929

  • SHA1

    a3da0faa9f1e454d428fa3a822e4b6a326c040ab

  • SHA256

    516a25dcd603694e847b12103d7ec2248b0a898b71921aa60b1094e2ae6f53db

  • SHA512

    a8dd31da6eac114a6bfe01edd42b757079fd895d602ffe9b802cddcc9326ed510c4aa4744cd5b2fe757ab9079b81b68d509998a6b445538caccc2a4d80ae6770

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiT:BbdDmjr+OtEvwDpjM8O

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-18_20a745b12d0e3865b755fb29433b4929_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections