General

  • Target

    2024-02-23_22f4a128fd67609bf2d239f987a3ab39_cryptolocker

  • Size

    50KB

  • MD5

    22f4a128fd67609bf2d239f987a3ab39

  • SHA1

    774ab72444af54a2d7dfb61ed0a96cc21cae7675

  • SHA256

    5a719df659006283c6a78d7c0d6b6a8e3c93d154cad71c2e4bc745eb93c60c15

  • SHA512

    bf7455a2809ca872685b392bd5af96d7a90d151dfa67cd561afbc7f45fd7dc7008a688e8b10e2ffa62b5f2e7f707bac9eae295ba5fcb234ecfe9316dd10e42d3

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQPdUv5:BbdDmjr+OtEvwDpjMXY

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_22f4a128fd67609bf2d239f987a3ab39_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections