General

  • Target

    2024-04-20_447c60679ea2aa30cd8b61b0d5cf1a1c_cryptolocker

  • Size

    48KB

  • MD5

    447c60679ea2aa30cd8b61b0d5cf1a1c

  • SHA1

    b0ec93069e819d486752b4ce23563e3532602455

  • SHA256

    615323e1e9c8fc463e5b62899ac6dc150ec11dc65a17e5a6d78bdef8bb457067

  • SHA512

    cc69bc719072063c70f04a48fd12fae4a377eede2d63e675ef2576c16cd0e070d1338d18ac7bf3f43b289bf1be9bce78fcf13e26b6be7d62c0f4e17dca4673b8

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MofZW:qmbhXDmjr5MOtEvwDpj5cDtKkQZQh0

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_447c60679ea2aa30cd8b61b0d5cf1a1c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections