General

  • Target

    2024-04-21_46c0caa1d58aa51cb650ff618619a42e_cryptolocker

  • Size

    62KB

  • MD5

    46c0caa1d58aa51cb650ff618619a42e

  • SHA1

    e9cfbb11334556c180a40bce560e06d1a01b74f9

  • SHA256

    b1222b2ea9d0751fbf23cccb43444c9c374f0f98f39355932343619b91aa5a2c

  • SHA512

    e524077a17decbf173cc921bf4f1472c5790fa4bf95de768fa7656b69998bd460af7b63219dca953b823cc30890c4d675f72f5041cb8fcb6d7e5d07ddd540ab3

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsik:BbdDmjr+OtEvwDpjM89

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-21_46c0caa1d58aa51cb650ff618619a42e_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections