General

  • Target

    2024-04-28_9e5f7377c4f1a7e3046cb7066962eb90_cryptolocker

  • Size

    49KB

  • MD5

    9e5f7377c4f1a7e3046cb7066962eb90

  • SHA1

    c9d92def23f63fafe343a5085222d62e53ff5f7e

  • SHA256

    47bff3901af35dd04b7eb41f403b29ef896f5cbb83fb54c56ae268299c4c79af

  • SHA512

    0634793394c9acd95e64e7d317ad2fa641d31b17cb542ed7f86930b35e406cd6f625309209f0c4747959cb69163a488ec432d040eceff3c8b85ac8363756c27f

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mocv:qmbhXDmjr5MOtEvwDpj5cDtKkQZQu

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-28_9e5f7377c4f1a7e3046cb7066962eb90_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections