General

  • Target

    2024-04-18_9d0922efdc0ca152d422c86244072d3d_cryptolocker

  • Size

    62KB

  • MD5

    9d0922efdc0ca152d422c86244072d3d

  • SHA1

    2e2547adbcf693c4676e4eea8ae43d038886e8e3

  • SHA256

    612392f8b7b6b33446e61bb990a4d4c52bd6bda664393b6787200ea44e058fc0

  • SHA512

    bbf71ceff82daf45afee4fa6a030dc8afe6c64cdcc8bd46c1aff5d8bfad7ca463ccd3e3489f27a136d130d4f8577ddff7b77145070ca461617c53da08e673760

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsif:BbdDmjr+OtEvwDpjM8y

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-18_9d0922efdc0ca152d422c86244072d3d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections