General

  • Target

    2024-04-24_69d3530371c1ed3ed24ede04dcdcec2d_cryptolocker

  • Size

    63KB

  • MD5

    69d3530371c1ed3ed24ede04dcdcec2d

  • SHA1

    9cee659f7b6e9cdd2630c6a1f835f0ca039e1c4c

  • SHA256

    e782669b3aee32d567132365b8afdf4a8172180fd3b488274f58cbcd9949ca47

  • SHA512

    87eca2c3d845183962c934611784eb94a92da771a39151365521117f53db62e41e6f9131a9ed026dd4e7adfa2e4672d82001daf439d65123d206209bb5c80264

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiF:BbdDmjr+OtEvwDpjM8M

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_69d3530371c1ed3ed24ede04dcdcec2d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections