General

  • Target

    2024-04-22_18e93afabd453f05ab089ba528e45bcf_cryptolocker

  • Size

    49KB

  • MD5

    18e93afabd453f05ab089ba528e45bcf

  • SHA1

    f76513ef67f67ddba54596c4782f316ce5947fad

  • SHA256

    180f7a836b7c8e56b438f08ba6b0b28ffdcb1f9714ad339e79f01149c5ec0344

  • SHA512

    67499c08a18abea4293459e00066dd0b478a80938d224420d096b29ea61bffb2fd9a46956bcc3c2754befff609297c72b7ede23628414568bae9c9d1484123a7

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mocc:qmbhXDmjr5MOtEvwDpj5cDtKkQZQJ

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-22_18e93afabd453f05ab089ba528e45bcf_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections