General

  • Target

    2024-04-19_47d700f17da37b4c8d2c3203779601fe_cryptolocker

  • Size

    62KB

  • MD5

    47d700f17da37b4c8d2c3203779601fe

  • SHA1

    c6805a31674847b169b25b3aba8f348315f43e94

  • SHA256

    a9a3cf1abdba37ea3ac51afd07563e07a80f76a88438af56a46a6a065d63040e

  • SHA512

    b48e683d0d12525f9cc53cba2c6af63d69b1d1c0b4c19e18ac38cbf265700ac92bee1cd33c32df60f32fb0dee4098a97cb48247e094d9b5e6a1a1bc6a38bfcb1

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiZ:BbdDmjr+OtEvwDpjM84

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-19_47d700f17da37b4c8d2c3203779601fe_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections