General

  • Target

    2024-02-24_23947a891ca29592a001e2ee44d838f9_cryptolocker

  • Size

    61KB

  • MD5

    23947a891ca29592a001e2ee44d838f9

  • SHA1

    2c2b8aceb2da520e55052f6f78a95ad45c11e8f5

  • SHA256

    ef6815dc6c69ad3dd48cad8ce0d483f6bff8260efc5e3bc2721aa56add56b5be

  • SHA512

    d0d07744c876ff040091dc59bdbcaf1c983d573f09b3639e881f477eff1b7fcd860b549e570968f0e7c72b6a404c39ee835daa2bd4bd3e545f1d214b8cb6a02b

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtskPW:BbdDmjr+OtEvwDpjM8r

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-24_23947a891ca29592a001e2ee44d838f9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections