General

  • Target

    2024-04-27_2171ce6fa7861f57ac14557e68170018_cryptolocker

  • Size

    63KB

  • MD5

    2171ce6fa7861f57ac14557e68170018

  • SHA1

    eee5c75f3a0ef525e35218a9f0aee9b0eaa0bccd

  • SHA256

    74006c594450635ec47adc71199b9b6d5887396c432958fee1d6106c3670bfdd

  • SHA512

    e0c2f6dc4ddf6c2e7c1b4b28aa7a2fed112fcdf1265d9aa9421d3d1e0c34d88df3cebd24b2882c058b947b4d3a531ea021c53bc56e6d2183f9a140d24a21dae1

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtsiY:BbdDmjr+OtEvwDpjM8J

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-27_2171ce6fa7861f57ac14557e68170018_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections