General

  • Target

    2024-04-24_4c9ce298c8d7471d603fba503e79cfd6_cryptolocker

  • Size

    62KB

  • MD5

    4c9ce298c8d7471d603fba503e79cfd6

  • SHA1

    7d4e5b0ff42e679783f39b4ef1b740aab2b7be2b

  • SHA256

    7ee927053fb365c220235014501fc651ae48ad938d437e0ec957936a96bdb595

  • SHA512

    c2e50d08718c3c81ea205f5d53719d885491b2c635ba653f7097d1271de34c51cd818937ed4a20cb28cbc18cfcf24db49a36d38b3f39ff595341b8f3ebdc1fb7

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsi3p:BbdDmjr+OtEvwDpjM8g

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_4c9ce298c8d7471d603fba503e79cfd6_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections