General

  • Target

    2024-04-26_f3005b218b1a5540d8049b23d12a8e44_cryptolocker

  • Size

    63KB

  • MD5

    f3005b218b1a5540d8049b23d12a8e44

  • SHA1

    7002d50325e103b6e2544710c9144a9e0a79ca28

  • SHA256

    0d743c547cf6f8d4499819df28d39484f5f07c8a061184bc1abeb1360b9dfbb2

  • SHA512

    2af3f60662b4d7d89bd24ecd5dce4ae9bbeac69137173389f62bc8a1f5af20be3830ed445cb5c16d1dc52acb886175ff86a983255fa979896bc19c52179f3db0

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiM:BbdDmjr+OtEvwDpjM8N

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-26_f3005b218b1a5540d8049b23d12a8e44_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections