General

  • Target

    2024-01-23_54a846517ab39534f32fd1e9983589d9_cryptolocker

  • Size

    58KB

  • MD5

    54a846517ab39534f32fd1e9983589d9

  • SHA1

    d303a0e9a59e204256d3e723d63cc44269447e4c

  • SHA256

    c67d315ba965fcae513c457a04d0178532b953d8a55b6834acb0854aae5220ab

  • SHA512

    10b6c8015679aadcad8dec99561cdee9c6addb8deb1fdeceefcc9a930af66ef48ec462b502e4af571e0ee2d2831b719c68b7df3857bcab7e9f5c8a047b97723c

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb614q:BbdDmjr+OtEvwDpjMF

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-01-23_54a846517ab39534f32fd1e9983589d9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections