General

  • Target

    2024-06-04_6c8bf0eca319027c591667f7fc7398c2_cryptolocker

  • Size

    48KB

  • MD5

    6c8bf0eca319027c591667f7fc7398c2

  • SHA1

    f1e72a459d96821c68f203da0358bf089321226e

  • SHA256

    c4a99e1e479bc79c20d584150887aa73b40e331298f618ced199bc6a9700786a

  • SHA512

    ec2a09b08350a1ab2fdcf596f9d2774a39ac2332158b34769a3310c55cb16a138d3fd74ca14a4fc85541967bf8100663ce86f9b87aad1f8984eb9e1dae2f90cb

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoL57:qmbhXDmjr5MOtEvwDpj5cDtKkQZQV1

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-04_6c8bf0eca319027c591667f7fc7398c2_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections