General

  • Target

    2024-04-23_7f340697ea9496a5b59f54b804a4969f_cryptolocker

  • Size

    49KB

  • MD5

    7f340697ea9496a5b59f54b804a4969f

  • SHA1

    f0d1b000d95e9cf413e9bdba5c67825df4054d44

  • SHA256

    9f49955efe056af70377666380de07249775ff6798090a76b4957b641b4c0685

  • SHA512

    b0ddf43fba0056654181955ca6c731f45f8b7dbff1236325aeeb8aab101f2a198d83b74e474bf55cc88ea8e6c3d9438ef5c60a3187288919174917180c82b6e3

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoccO:qmbhXDmjr5MOtEvwDpj5cDtKkQZQk

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_7f340697ea9496a5b59f54b804a4969f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections