General

  • Target

    2024-02-18_38be92b5e7fe4b51592fe354faed6351_cryptolocker

  • Size

    60KB

  • MD5

    38be92b5e7fe4b51592fe354faed6351

  • SHA1

    27b0fcea81242d1c732d842d5da7342172d95f85

  • SHA256

    5f3a0e68a7eb3408a5165f1768ce23325d540c887c2a04df8b950b544f6ace51

  • SHA512

    f7dadbfecbbef81acc50f1fdff081564df9c5ef141c78a23dc5019f1502c6207746c2ce98f123033a6c57fee8b52fb990a7348617f063b67cde300381f184d85

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtskuw:BbdDmjr+OtEvwDpjM8u

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_38be92b5e7fe4b51592fe354faed6351_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections