General

  • Target

    2024-04-20_933c356007e328a62591c3c3ec8414f7_cryptolocker

  • Size

    62KB

  • MD5

    933c356007e328a62591c3c3ec8414f7

  • SHA1

    6f34578147d98245dad77de519a74f2ac184b91e

  • SHA256

    300e8afe23e01f5dab9223f1a42001f537c2d7ee3f68513c9af13009e1472deb

  • SHA512

    573787051d55234413b7f99f6d0490f1a4b0240844f260bc4f1081b63a401d9cdd158c5ec8aef527e3d7529c4c670918b13731c4b4b6ad999711b12d77a807d4

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiG:BbdDmjr+OtEvwDpjM8b

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_933c356007e328a62591c3c3ec8414f7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections