General

  • Target

    2024-04-21_52065254b14d6e42164d817e39942510_cryptolocker

  • Size

    46KB

  • MD5

    52065254b14d6e42164d817e39942510

  • SHA1

    b50723c1e4b466ea51cfa26ecf29cb3fa4ae7607

  • SHA256

    11d1047212687caaeef386120df59a9b06fc760ecad5d8066bef77e420da91c4

  • SHA512

    727741670aeb519541e06499530bd01dedb9eaffa8b212dfd2a44ce0fff712d2c794d1bf86a74d66f766dacb78b460d5c8785d2908ee11eef205b2990fcaea03

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoL5m:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ6

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-21_52065254b14d6e42164d817e39942510_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections