General

  • Target

    2024-04-30_17d9da4d03809d13c087e3491a1d9316_cryptolocker

  • Size

    63KB

  • MD5

    17d9da4d03809d13c087e3491a1d9316

  • SHA1

    7dc04f7e9235a6d1c88c7aeed540d5338ae40abc

  • SHA256

    e57922aa93de6d10e7b8cf8fa74564f85d24f2e3bdf8202dd1c44f5b543daff0

  • SHA512

    04da4a7c399d20c40c163bdfb2d8863a2ca79c22a4070882c0603f822d2ef31ae981bc177bb1d0d69a65c53daad5a486411a533121909e1d20b5e92432136179

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsii:BbdDmjr+OtEvwDpjM8X

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-30_17d9da4d03809d13c087e3491a1d9316_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections