General

  • Target

    2024-04-22_8c810de4df19dffd8ce1b731de5f5c48_cryptolocker

  • Size

    49KB

  • MD5

    8c810de4df19dffd8ce1b731de5f5c48

  • SHA1

    535fbb0162c60713c0648246c0f208dae4d1fbcf

  • SHA256

    0748ef85e316d6ee4fb369ff4a28dfc363129137335f90a3ce0a263dd2550ae3

  • SHA512

    6577bbd7bc56a5f231642f604cc9ca8d79c04bd6b547f0228ffc78c9ae78239a4742689fcffeb2168fc9671b97787b1b806116dcc0b562bc65b97bf02355ce6a

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Moch:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ8

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-22_8c810de4df19dffd8ce1b731de5f5c48_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections