General

  • Target

    2024-04-21_90a46559e353ec9d4c714bcdcebab2e0_cryptolocker

  • Size

    49KB

  • MD5

    90a46559e353ec9d4c714bcdcebab2e0

  • SHA1

    a4a8129957b3cba8f44a89fca0cb4fcd1ee3cfc0

  • SHA256

    b0cbe6cdbdae5be5de6f4f2f1b8fdba9887238a3a140a2859e81f82d867837ed

  • SHA512

    9cd2c4aa47704a296f692ec069201b3c34be6d3a2595977eab0ca31de02efa8801964a08282b1b0b8f9a15f2e7321345165bb00d1ae76ef72795cca9814d71be

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mocc5:qmbhXDmjr5MOtEvwDpj5cDtKkQZQP

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-21_90a46559e353ec9d4c714bcdcebab2e0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections