General

  • Target

    2024-04-24_256e42e6d00fef4a7fa2b1c3fdd657f5_cryptolocker

  • Size

    47KB

  • MD5

    256e42e6d00fef4a7fa2b1c3fdd657f5

  • SHA1

    9d71d975137632b677c853626df9d6eb1f51af40

  • SHA256

    5c9e33e867b5151d471078ad929e8a97117c2928bcf456cada12009bdeedcbe5

  • SHA512

    f4693e5cab45fa42a22d25d9a0a2baaf4343449ffadb709f6738cc0cfe5c4d7f31b824adfa3925a0714911ba8c43a9d7512e2fd62ff967f7e1cb02d78d44d423

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mobpy:qmbhXDmjr5MOtEvwDpj5cDtKkQZQjy

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-24_256e42e6d00fef4a7fa2b1c3fdd657f5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections