General

  • Target

    2024-05-12_4e67ffdb1df57762b5b0228ea8f445e3_cryptolocker

  • Size

    64KB

  • MD5

    4e67ffdb1df57762b5b0228ea8f445e3

  • SHA1

    49c5ce3dacec762142f29d05a024d5875c533721

  • SHA256

    8766e9c44a4130932b55dbc17d1f82d1a289f19ce07ccb0ff1a15458d6c8f584

  • SHA512

    ec302d6b57b6b62a6d6cdffaab5a843f3d0494c69230ce8cf783a37b001d787fb4cfc37f114609f1b2c79af452afe314a006136b25da6a3bc4f6fb5dd8ef3b0b

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsihG:BbdDmjr+OtEvwDpjM89

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-12_4e67ffdb1df57762b5b0228ea8f445e3_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections