General

  • Target

    2024-04-22_ead6c9054c6d80111f962e6428d44dd1_cryptolocker

  • Size

    49KB

  • MD5

    ead6c9054c6d80111f962e6428d44dd1

  • SHA1

    87dabcf1448a8b850e58dd0c547fe2a06cd865f7

  • SHA256

    e6817a9c548848ef6803de7a503ea09aea088bad2c20dbbea5987efef40ddf23

  • SHA512

    e7b1bb36a09c35bf4af58b5d1cab42e022b83af2a84765c42789e25f198b8c89b1053110194286e423ffd8fcbcd87e6c6b9d54d7e6f1c564dbe8d424d6fec743

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MocA:qmbhXDmjr5MOtEvwDpj5cDtKkQZQN

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-22_ead6c9054c6d80111f962e6428d44dd1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections