General

  • Target

    2024-02-29_8d41023a11f71ea6a5c1de88e64d8cfb_cryptolocker

  • Size

    50KB

  • MD5

    8d41023a11f71ea6a5c1de88e64d8cfb

  • SHA1

    17485a51ed035e2dfc231894fa6a8d211cd93d20

  • SHA256

    420d0ba1dd0a4152be460361dad219e9b455afcde179227298c2c57fae90606a

  • SHA512

    063ef4dc386c77e9ad6d6f1c9654f4036e3b8369fb6da8f55683fb29eba7fee9b8c2f6b6bf7570686c22b1b67e1361adc080b8cf7db9b8e345b1e006b44ba517

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6Impy9:BbdDmjr+OtEvwDpjMq

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-29_8d41023a11f71ea6a5c1de88e64d8cfb_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections