General

  • Target

    2024-04-23_9ea672c992623fde7f5ecbc99009b5df_cryptolocker

  • Size

    49KB

  • MD5

    9ea672c992623fde7f5ecbc99009b5df

  • SHA1

    d73525790c3783f17c21e72f746ebb5ef647eb84

  • SHA256

    e1d8dd92efd441c1d90048b77d901073fca9c2952739c6868228fe3de2d7488c

  • SHA512

    1685c10b19a26d5a506b9b5d8fcb11b72f54772f4d6f10f09fc4bb31f518ab441b3440ddf6ebd2d89d2640464eebc9872345e385f4408b5d8d9edf52b9f86827

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mocj:qmbhXDmjr5MOtEvwDpj5cDtKkQZQC

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-23_9ea672c992623fde7f5ecbc99009b5df_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections