General

  • Target

    2024-04-27_c413d4be14e4434004e60b8a4357e36b_cryptolocker

  • Size

    46KB

  • MD5

    c413d4be14e4434004e60b8a4357e36b

  • SHA1

    a2dd47551afcc6d75ae76e66468a3fdcf2ff511d

  • SHA256

    dd347423a7e22ae33d4af351a97603976081a42127df98134f237b22392f1ebe

  • SHA512

    c66d9fd2b193e967bdb76c404fd3ee7c42e4b501845599e424734c221e321a4ededd775f7f6b683e22fad4862cedc612b57246340b9d89a8d46c6f011f9ce784

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoL5T:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ3

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-27_c413d4be14e4434004e60b8a4357e36b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections