General

  • Target

    2024-02-19_284218c563e31eff62a276578a2e8752_cryptolocker

  • Size

    46KB

  • MD5

    284218c563e31eff62a276578a2e8752

  • SHA1

    87293efde788fd007464a40cfd702277aa5444cb

  • SHA256

    349dca58c2e3bce5ce2173cbb68ab6131c725dd38acc38405c52cd7681a59b33

  • SHA512

    81d08315397fe046100732ea732b90a3ff3b7f36ec72f70c04b99f520aee3539662c63517409dcf1f25f3c6ee9887841e2c2c819007e1bf48a3032b8cacf7827

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo2pL:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_284218c563e31eff62a276578a2e8752_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections