General

  • Target

    2024-06-04_404c207b327671e9019a6bdcd6309203_cryptolocker

  • Size

    58KB

  • MD5

    404c207b327671e9019a6bdcd6309203

  • SHA1

    ed8c527f7401562f4ebf1f3bdce19030477ea15b

  • SHA256

    167b3b776086a30d4c8ee304841183797dce30da28eb42b77299f0e8c48bd6a3

  • SHA512

    8c3ba79cc3d303243296d93715605b949ab6dcbfe7ee15f5df4b58cee95f1259e82589b6dfe887868cde0dbee71a6c232d46b9ba871abc9cc08dea75d28fb73b

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6Impy4:BbdDmjr+OtEvwDpjML

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-04_404c207b327671e9019a6bdcd6309203_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections