General

  • Target

    2024-02-13_d53dfad5e67e64a3caa7d6229a057f73_cryptolocker

  • Size

    48KB

  • MD5

    d53dfad5e67e64a3caa7d6229a057f73

  • SHA1

    a1c6a875d6a30fd50abf5f879d3291e58a7537d7

  • SHA256

    5f637e145ddbb137d20c398b7e56ccb6e696cb0c72071f061197c43c37ae3723

  • SHA512

    de70ce2b7c08ee357702463e728bfe46aa65a04abb89affd2d264f4b9e114debed58342abe56757dd18d68c41bd1a5f73b1546fcfe3a7bad197f4548973fa1bc

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUv8:BbdDmjr+OtEvwDpjMXt

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-13_d53dfad5e67e64a3caa7d6229a057f73_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections