General

  • Target

    2024-03-11_23ddbd18f9eed85a6d9bfb05308ace22_cryptolocker

  • Size

    48KB

  • MD5

    23ddbd18f9eed85a6d9bfb05308ace22

  • SHA1

    357dd2a0ab57978e6c52c2dab6da45b8865b9da2

  • SHA256

    fc840c2915623a615b86260e54ac893ebc1653922540526e144bfe95eccc0ecf

  • SHA512

    218bc4538be4f4b79fb2d65cb84b6521a6133c487d89286157bf6698fa29cc855efd25647fbb3de24a4a7983553f82c0d4130c29043e1e044d26440cde04eabb

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo22y:qmbhXDmjr5MOtEvwDpj5cDtKkQZQJy

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-11_23ddbd18f9eed85a6d9bfb05308ace22_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections