General

  • Target

    2024-02-18_ac2d3f51fd998cb51afe0ba0effb4717_cryptolocker

  • Size

    48KB

  • MD5

    ac2d3f51fd998cb51afe0ba0effb4717

  • SHA1

    b180a123f459edb6b6add91853d79dcfbff74450

  • SHA256

    7e5939fa7d295e550eea03c48fb631d4f531707a6bd419f908ecac01bf55ad6b

  • SHA512

    05f47e9405da48f0d91d3c084bc62780bff138d3e6830dda319e8de0780123f4be4c2dbbc97d8a7bc4528978a2060030dc849c339162df434c9e14a9e5583657

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB52zg:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6u8

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-18_ac2d3f51fd998cb51afe0ba0effb4717_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections