General

  • Target

    2024-04-28_4ddd0b7d6f536e51760ed02d641410fe_cryptolocker

  • Size

    62KB

  • MD5

    4ddd0b7d6f536e51760ed02d641410fe

  • SHA1

    db8acd3a80b72a62aaa1187e4ef43f892ee2730a

  • SHA256

    23b8e12620c68a1b9b6a5d260b23dab44ab5d345880fe0d9dfae5d7059ed609f

  • SHA512

    8cc3f9e9f5a310659bc5a5ff344424cbd6c12047d7182af23c74e76a00e89df7e729311767a4f800eda5bf57669e9bc095aebf86e64c516dfb7bc62047ec70fc

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiS:BbdDmjr+OtEvwDpjM8n

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-28_4ddd0b7d6f536e51760ed02d641410fe_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections