General

  • Target

    2024-04-17_d672b2729a5e9b9c2b9aba4ca454264d_cryptolocker

  • Size

    62KB

  • MD5

    d672b2729a5e9b9c2b9aba4ca454264d

  • SHA1

    4c7d9b1d4c92806478707ed3d2e9fd0c55bb4b0d

  • SHA256

    06a481bacf099f9540a0911797f876647c2e6697e89e3c133612ef47e9161b8e

  • SHA512

    e89535cde3f64efe75312413346abc7edcb2c52ed2721d377b4cb377e488034633ba9f5f26545d7b951a512a2ec6d23c7e078a02a9e2eb43c2cb4cc14cecdc05

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsii:BbdDmjr+OtEvwDpjM8X

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_d672b2729a5e9b9c2b9aba4ca454264d_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections