General

  • Target

    2024-04-27_6ff6516ca50ad2fef09bdd26bd91fd23_cryptolocker

  • Size

    31KB

  • MD5

    6ff6516ca50ad2fef09bdd26bd91fd23

  • SHA1

    d3899059cbd3474227f1337427619a6ae6124d6f

  • SHA256

    92b28983a04721dacec683844d0c80a0a1f62808d0f60418f69a6f124369be07

  • SHA512

    ec7b7c8a8ebca34c4c9ccfb12b406b18057ee3796d673cc7e4270760ef0228aec1e4b82de2699718e4b6bb9b049c16aae55f34feb9d07c9184f257080eb8b375

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+4tHurJe:q0zizzOSxMOtEvwDpj/arq9

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-27_6ff6516ca50ad2fef09bdd26bd91fd23_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections