General

  • Target

    2024-04-19_23e7f0edf49aa7dc8e068e1616607def_cryptolocker

  • Size

    49KB

  • MD5

    23e7f0edf49aa7dc8e068e1616607def

  • SHA1

    e040356ce797f9f0077af3764a966380d30c249f

  • SHA256

    fddc922e903369fe3c30a65ae98d04d28479d2461b3cb1fc1f358821ab95b3bc

  • SHA512

    9fbc31dea369af969df735db38e83a41c2af5f6a684aa70ad02654bda38e5f5a9b4606cf28a8efbd3e70bc3e303658a0e4a027e7c1597210609f3d918c3420ef

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MocB:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ0

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-19_23e7f0edf49aa7dc8e068e1616607def_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections