General

  • Target

    2024-04-30_6c7442f156f96436925dd894ec23b171_cryptolocker

  • Size

    47KB

  • MD5

    6c7442f156f96436925dd894ec23b171

  • SHA1

    da6792fb7c27ab8109d297910a834508bfd5e6f0

  • SHA256

    bdceff9d68bd17aa7cabc7df2cbac18256389b461637619059af05d863718d45

  • SHA512

    d73cf11aca21de1a8e385005854270a78daa3760f3b365953dfc5fbf33d2ddfe2a353550b18f06e044145e4031cfc78ceb6e8dcec3c1ca192347f40770a59970

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoAp:qmbhXDmjr5MOtEvwDpj5cDtKkQZQg

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_6c7442f156f96436925dd894ec23b171_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections