General

  • Target

    2024-04-19_f2369fd924f57a54ad7d9a27ec762b9c_cryptolocker

  • Size

    46KB

  • MD5

    f2369fd924f57a54ad7d9a27ec762b9c

  • SHA1

    d68530153383f7417b3ee289e16e325c8fd8ccbf

  • SHA256

    e5b20e8b2379b06c5dd437e412e7ef83440060edd111b01c9347e4035acdd31c

  • SHA512

    cce89ff00bb073342fd4862dc44847f28e28c7592d7ea3341841097dd79ad35159194fd597de450bcde553c0bc2f5965c6c4720b2f35bb51cecf0987abadec23

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoAZ:qmbhXDmjr5MOtEvwDpj5cDtKkQZQg

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-19_f2369fd924f57a54ad7d9a27ec762b9c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections