General

  • Target

    2024-04-25_b40d6a933e11abe5caf164625c7df087_cryptolocker

  • Size

    62KB

  • MD5

    b40d6a933e11abe5caf164625c7df087

  • SHA1

    b6ebb5c087e2c9084b275af119816f4ee0283004

  • SHA256

    a5ddd32452ae39f1b80aa524103b4b74dca2794af36bb67d488317ec0e43998b

  • SHA512

    d6c9998994a63c5deeb2a2475b04be643bc726c7a7335bc0dc1c38beeb1be14b1f7f3df3dadf31b300dd61eae7ff4f0be213c122732cfb4f5e81136dec4cad82

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsit:BbdDmjr+OtEvwDpjM88

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-25_b40d6a933e11abe5caf164625c7df087_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections