General

  • Target

    2024-04-30_4bc5e0a6c4406a9735483c134d9bd874_cryptolocker

  • Size

    49KB

  • MD5

    4bc5e0a6c4406a9735483c134d9bd874

  • SHA1

    ab9f586af15393ef33f02cf93161d86881e3a553

  • SHA256

    06fa2ded01fdfd502b87a07562fc4ef8e2c306bb4e70031d3e43fea6f3ed7f0f

  • SHA512

    3109d9d51d47949dce66880c49887cc0f697683df2c81e5db8264dd333fe479269bf316e1eaf606409fd348ee3a4827e30ea30c55f9b3f106f2ffd04398a19a0

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Moc1:qmbhXDmjr5MOtEvwDpj5cDtKkQZQQ

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_4bc5e0a6c4406a9735483c134d9bd874_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections