General

  • Target

    2024-04-20_0a2ed42dd0901265533d340b99a96acd_cryptolocker

  • Size

    49KB

  • MD5

    0a2ed42dd0901265533d340b99a96acd

  • SHA1

    41348d8debd11ee51399c47b8c2c60184de4bfc4

  • SHA256

    1bb0efdf88464284a6900227e42fdd3dc3c9d7e48c55dabe71dc9e47d691e410

  • SHA512

    d9e593ca553ca4911c74e0cc2760e83e1d4396f07f8f09eed5dcec2cb2363afec38e7b6fe1efb1a49ab71acc6c995003d86d316b883cf22cbe71168e6001b575

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MocX:qmbhXDmjr5MOtEvwDpj5cDtKkQZQm

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_0a2ed42dd0901265533d340b99a96acd_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections