General

  • Target

    2024-04-22_4b19dc943f148a318850d2c8c096d2e9_cryptolocker

  • Size

    54KB

  • MD5

    4b19dc943f148a318850d2c8c096d2e9

  • SHA1

    e85d75ee8b3b22c7db0e059fe5993a18bf760b5c

  • SHA256

    21449adb7ea99c82cea772738708810cde2d6da2549ecfdc2a2718c9fc48d5ce

  • SHA512

    6b5a51f4043922ac5f562c4146c63616ec416fc1eea9958f65d0a61f5d739f959c03f5285772c859169ae58b2dd273f0f4d8eb9e5533fff4e811e2502d8bcc03

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb6ImpyH:BbdDmjr+OtEvwDpjMc

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-22_4b19dc943f148a318850d2c8c096d2e9_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections