General

  • Target

    2024-04-19_195b6e5b16e73e6e8489b8b0492aca7d_cryptolocker

  • Size

    62KB

  • MD5

    195b6e5b16e73e6e8489b8b0492aca7d

  • SHA1

    cbe0151d3ed59ec4fa0edb0ff6387e9dedcd6456

  • SHA256

    200bd15effb355b7ddb58499df472a0f11dbee61284d3a03d81c2408295721a3

  • SHA512

    7bbdd86c05e27e62501e1f4d514edcfc48b4d5c06b13fd2189eb94a254101cbe8b6b338402a8d10d1b2f95871d1041b5838fd4424fd0ffcc91bd66ebc7f32199

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsi7:BbdDmjr+OtEvwDpjM8m

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-19_195b6e5b16e73e6e8489b8b0492aca7d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections