General

  • Target

    2024-02-24_ce7e148e8e2ea3624a4166096a8deb6b_cryptolocker

  • Size

    56KB

  • MD5

    ce7e148e8e2ea3624a4166096a8deb6b

  • SHA1

    806da64adf15289724379d0d612acb248d4eb92e

  • SHA256

    6230c48cc607e8180d1f1d83a39e00ab66240a57b6e937c7d1255455fd85f47e

  • SHA512

    16572a63821465485aef492770a23777035e033426682ab610cc418600ba951b57317767193bfc52da55b4125ae8738419a0f3336b44ff7971758cb63f2b88ef

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb616d:BbdDmjr+OtEvwDpjMU

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_ce7e148e8e2ea3624a4166096a8deb6b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections