General

  • Target

    2024-02-17_10567ad9ff927445fae636762cabcafa_cryptolocker

  • Size

    45KB

  • MD5

    10567ad9ff927445fae636762cabcafa

  • SHA1

    d480761260501928652da34c48195a36298d64b1

  • SHA256

    f8cad556405d6c2ef0f32ce55c03a7528b2d1a454af5893f3e554bdb703bfeca

  • SHA512

    248097b06c00c73b6c36062a4f2fd12fd2d30327b42b46d7906ad039133b77530cf8ba7dfcf1a45554406bb8671f8fbf07dbb89f7cbe1331759c506cba64133b

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mom6:qmbhXDmjr5MOtEvwDpj5cDtKkQZQl

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_10567ad9ff927445fae636762cabcafa_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections