General

  • Target

    2024-04-24_21b9a6169d1805500ad9b8ce3b8b6b32_cryptolocker

  • Size

    48KB

  • MD5

    21b9a6169d1805500ad9b8ce3b8b6b32

  • SHA1

    0bf6081058d855e18e5c0a70fdbe470e4a018ed8

  • SHA256

    17c9fb11e33a2638810dff85ce45c8f15ce289047bb039c98f86a6d3299cce42

  • SHA512

    aed1c384109832312a85b3c9b1fb2f5793b5a69904b545084a631697dec3f06ae0c4568409a014ba2dd36a2697aa0055f43b2c26d9b35554d80c912dc3bcea23

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MofZI:qmbhXDmjr5MOtEvwDpj5cDtKkQZQhz2

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_21b9a6169d1805500ad9b8ce3b8b6b32_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections