General

  • Target

    2024-04-23_6a4624dfb2fd173eaac72d5892223145_cryptolocker

  • Size

    47KB

  • MD5

    6a4624dfb2fd173eaac72d5892223145

  • SHA1

    1a29b3949323d61883bb19f894758e65245ed786

  • SHA256

    f98788de05f6cb5691fa977e411e5601e100c03923d171ef5289956d7704fd81

  • SHA512

    87e08deb69556956da971bfe5fd7327668c64b1d01a67f6c7379b06376bb3768e03faca320dfcc83167dcd366a081ddad92383e72a1cc87948654fb83737d7ee

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoAd:qmbhXDmjr5MOtEvwDpj5cDtKkQZQc

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_6a4624dfb2fd173eaac72d5892223145_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections