General

  • Target

    2024-04-20_d56f32e418886e70df788786e1d9c8c1_cryptolocker

  • Size

    46KB

  • MD5

    d56f32e418886e70df788786e1d9c8c1

  • SHA1

    3f12e2ded5af818d8aa1d9f6872623e8ca2ddfb9

  • SHA256

    c888d1accc736dc2e3fd3d97bce11035cbad6420e8c1dac9857d3ae87a806688

  • SHA512

    7c6a6aa70dba12221c344e68867ac2d593f019b709af0f8b4241a4dbec27c2d1559d406ee0b81014584defc7e995772ad8c8e15ea7b84c49baf5da9b2be07e33

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoAi:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ3

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-20_d56f32e418886e70df788786e1d9c8c1_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections