General

  • Target

    2024-04-19_6850ad5fd7eb506cad08419208ef0565_cryptolocker

  • Size

    46KB

  • MD5

    6850ad5fd7eb506cad08419208ef0565

  • SHA1

    f0c294557c41fc10f89875288fbf8d43ffebedf8

  • SHA256

    75a4452b5c39453ac86c8ca4e3d56c296f3bd053420f194f34c3a1de265ea445

  • SHA512

    31553ae974399c6b42c6092788a1c393a6f066db38e69e4685f087cec9b813ce523924b6192d026d40e6a97775e6f8137f62ae48915abe7ca4197d49716474d0

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoL5F:qmbhXDmjr5MOtEvwDpj5cDtKkQZQB

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-19_6850ad5fd7eb506cad08419208ef0565_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections