General

  • Target

    2024-04-29_7af4b3d9f3d4555439bafaff0457a65f_cryptolocker

  • Size

    49KB

  • MD5

    7af4b3d9f3d4555439bafaff0457a65f

  • SHA1

    9a24da86a6dcadafe9b89c0c19ab7465cf88b989

  • SHA256

    6fa460e1ad97baff8361b94b16107c3654e15ad11ea81fde8f71ae4c417a5cdd

  • SHA512

    79082faebe0b9a171aa2f6f8c00dc3471ad6dd052b6eaa67530294dabb022398c4343aed3f0ec709192259ae17d5d9688b95fb707e454738ebc6004a6ec49836

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mocb6:qmbhXDmjr5MOtEvwDpj5cDtKkQZQP

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-29_7af4b3d9f3d4555439bafaff0457a65f_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections