General

  • Target

    2024-02-22_b7ad8e6c1f9b055c7359f3ed22c329a5_cryptolocker

  • Size

    47KB

  • MD5

    b7ad8e6c1f9b055c7359f3ed22c329a5

  • SHA1

    e17d9f9aa6adce9602dcce0a844d34c772cfa5cc

  • SHA256

    bca3a495b23965f1bc8b6a1f0e157d7252351c1fd32465844272829ef1c40d4c

  • SHA512

    9d3c0002e3971714fb66a59431df5246d18de4e9a00150ac851ddad6eefe68362c7a523e7399b7569dd18fed5a681cf26361858a342d06d296331a7e6ebe4680

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo22V:qmbhXDmjr5MOtEvwDpj5cDtKkQZQJV

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-22_b7ad8e6c1f9b055c7359f3ed22c329a5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections