General

  • Target

    2024-04-27_450bc0b53e286bcf657a441335fbcf31_cryptolocker

  • Size

    49KB

  • MD5

    450bc0b53e286bcf657a441335fbcf31

  • SHA1

    c1777f6fe28bc3d838c5c2b238f4d779913647b6

  • SHA256

    072be7ebf1291dcae46879c9a38d375541148cf47f0c1bade7cfa658e98165aa

  • SHA512

    fd64dcd4b8964388de4b3bec174b56c0c820105dc83d1d5ef8d7e2a092c95c0ad294d937fbee142306cf12d7bbe4372c7e679b6e72fa7b690a802a90a5687a42

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Moccj:qmbhXDmjr5MOtEvwDpj5cDtKkQZQV

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-27_450bc0b53e286bcf657a441335fbcf31_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections