General

  • Target

    2024-04-21_d20798e6701148c90840a89a63f2f64f_cryptolocker

  • Size

    62KB

  • MD5

    d20798e6701148c90840a89a63f2f64f

  • SHA1

    3646afee0f4a01c046b3e9a29166e82a28dff733

  • SHA256

    a6dbb5825bd8862077231c084d596f002e136608994a2728ab2531026f1e286f

  • SHA512

    7ca38a759f2b84673957383ae4edd50c14898d4a3de3f771eafb3fb96ad0b4bfe37c21a6c3c215cc4aed919653954a61382d5b2a7eac2f4afed3a01dbc65f973

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsi7:BbdDmjr+OtEvwDpjM82

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-21_d20798e6701148c90840a89a63f2f64f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections