General

  • Target

    2024-04-22_140eaff5e24ae8ad4826a0653f86f582_cryptolocker

  • Size

    46KB

  • MD5

    140eaff5e24ae8ad4826a0653f86f582

  • SHA1

    a1c565255b4d2c81e996142fb8df3d9ce4c9d878

  • SHA256

    436da79682e1358457c28447193daa3ec7c6e792739aae88928874422f0295b4

  • SHA512

    9ed4a6b447e25503e716b79d93d919707426afbc0cb52fd506e4bd3081de987a2bc35aef924e3c3ce7ceeb9051651760f625b2c8d80af75099a2888a0aef823e

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoL57:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ0C

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-22_140eaff5e24ae8ad4826a0653f86f582_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections