General

  • Target

    2024-04-30_337bfed0af416c1d11efa9ac2f844108_cryptolocker

  • Size

    50KB

  • MD5

    337bfed0af416c1d11efa9ac2f844108

  • SHA1

    3eb924aaa0e4e0319e767db3cf65c8f5a6f3e20c

  • SHA256

    3ce64253662943622331b99eb13ce8321d1f8fb43b595f90bf027b5260334b9c

  • SHA512

    695b3e9d3d6f79093b938dd6b0faf54858e1e2f9a43d93a60f4e6c25897bc69dcb9481f2cb826f7ad35083d24884067e8fc105b8dbf0a92201b2f9b817c828ef

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoccU:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ+

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_337bfed0af416c1d11efa9ac2f844108_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections