General

  • Target

    2024-02-20_5d7c882b340a07b76817efe9a71b3810_cryptolocker

  • Size

    48KB

  • MD5

    5d7c882b340a07b76817efe9a71b3810

  • SHA1

    ffc4773e3d0e2403fef57197899565c045fb4854

  • SHA256

    10fa21ea8b7a05c6bb5aedff1816e38950277a1b5cadfcdda38053b8d7809ab4

  • SHA512

    6ec8e6ca1c6bd59bb5be9188236995cdd5ad98307e47cc9233e3614a9e0cd668050ce6d187ee6649d9f6daba7f941be69a72e216cb61480ac1f8f9dd6d0c5a55

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05WTB52J:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6uJ

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-20_5d7c882b340a07b76817efe9a71b3810_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections