General

  • Target

    2024-04-26_90fc4a71f4d4178b13987e5d51d0a7b0_cryptolocker

  • Size

    55KB

  • MD5

    90fc4a71f4d4178b13987e5d51d0a7b0

  • SHA1

    a5cd90b80ef9abc3ffe5537cd113411eeb2ab347

  • SHA256

    84db6d318df2dd317e46e42722db389d4f2919afda680ecdb645dbecc1e65fbc

  • SHA512

    b0b4819fbe936083c0a58ba4d9485e43317a1f10ee97774c8b82b6463b9f93b5ebfd5fce3d2d6a95974431a0fd574fcffe7a7ba255952d9a0c1e930fd8e31c07

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6Impyk:BbdDmjr+OtEvwDpjMf

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-26_90fc4a71f4d4178b13987e5d51d0a7b0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections