General

  • Target

    2024-04-19_35cb73914b0346cb9642574d7d39d6d4_cryptolocker

  • Size

    49KB

  • MD5

    35cb73914b0346cb9642574d7d39d6d4

  • SHA1

    d2e3c4cb191d9efa91384849ecff3512d6deb1d8

  • SHA256

    cee6340debdcb1c186078232fb78770048624e9ebf444b436b0e7ca2ec1741fa

  • SHA512

    5f13260cb240e2d0167d4761978ab970f0093ba403d088eea38c2c119b3994e2bea3489b763f59083c737c3e87ee8df158939af99b92418e5b2bf96e8da2ed6f

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mocd:qmbhXDmjr5MOtEvwDpj5cDtKkQZQo

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-19_35cb73914b0346cb9642574d7d39d6d4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections