General

  • Target

    2024-04-20_49eddee39cbe0f02d7fec3c8ea0af6ac_cryptolocker

  • Size

    62KB

  • MD5

    49eddee39cbe0f02d7fec3c8ea0af6ac

  • SHA1

    5c1689390a26bd1e213b0e2e94e7e92f5bbda1bd

  • SHA256

    a98bf718bd9a7c25dc0811a0d064dd7d006d78ed03b6a0d4cc101242001758ca

  • SHA512

    76a4138055f62ae338bbed0f12851b5c261dd9dcd313cc22d5aaf134d5b373f34ba0d852e82753bce174d4c6778a83c884886be961a807f4c6a308ca76f46c02

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiv:BbdDmjr+OtEvwDpjM8a

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_49eddee39cbe0f02d7fec3c8ea0af6ac_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections