General

  • Target

    2024-06-01_4b711d837bd915a946d5872af065750a_cryptolocker

  • Size

    64KB

  • MD5

    4b711d837bd915a946d5872af065750a

  • SHA1

    d3a4ecf8b0ce0d5292e0e3496ed0e1ae176cda30

  • SHA256

    9cf6a1ece514f2c6f1d67418f3c79206a78b9b798fb3c254b4bafc08e695a178

  • SHA512

    90ca5aa74e71dece8b3eb4dbc3ec9f3d0949a37c5b2d4b7c2eed491d255731533f3b5e8c9c4d5b99e64680f9f4533156e500458634a9d02698a66dcfd09ba304

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsihrx:BbdDmjr+OtEvwDpjM8O

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-01_4b711d837bd915a946d5872af065750a_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections