General

  • Target

    2024-04-20_4032a105781e6b683c30b87db79161f4_cryptolocker

  • Size

    48KB

  • MD5

    4032a105781e6b683c30b87db79161f4

  • SHA1

    11fc7f9176e578daa32e11f009235538492725e4

  • SHA256

    a57d94fd61253e8a71247370bd108ceff1540cfdeec9b93b7eb1087d7be13d5f

  • SHA512

    2b0d1ac89ab9fcd65abe39cccf04a86d68e00b3b4884eeca2af4242d16526802182f7b40ba91185d32566bca4145465ed50f766e7cea21d50603e48afed9c285

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MofZZ:qmbhXDmjr5MOtEvwDpj5cDtKkQZQhH

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_4032a105781e6b683c30b87db79161f4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections