General

  • Target

    2024-04-19_7782e1caa5955e324e68ffed0633ed46_cryptolocker

  • Size

    49KB

  • MD5

    7782e1caa5955e324e68ffed0633ed46

  • SHA1

    87c0cf7ad83af9c4a40555303568415361f12175

  • SHA256

    f7d4fdabad9c4a6f4349a0cea4590780c20cfefc3c0bf1adca2f15e5cbf89443

  • SHA512

    025acdc2c7eef3f96610618602e71b23e8fa978cee95f8726b0304ea1b8e5d1104cd436f70225bb5ce67c1ce331ef0ea8d9ab73e37b85df60258da9fe457b47f

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Moc1:qmbhXDmjr5MOtEvwDpj5cDtKkQZQg

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-19_7782e1caa5955e324e68ffed0633ed46_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections