General

  • Target

    2024-04-27_1d6d4c9e73c02e6f1889d9657f4fc3e4_cryptolocker

  • Size

    49KB

  • MD5

    1d6d4c9e73c02e6f1889d9657f4fc3e4

  • SHA1

    0452a6617a6b3512f44728ca8b771cd731b6cbf9

  • SHA256

    b2c844a0e81766db3e28f4e2079444cf4b0b435b6de271c4b2d819b7ba4caaf5

  • SHA512

    5228b72d6885d2a04ed40a1b2fdaa88baeb7d3e41f844d95121e72fcb433e4fa470f8ecb7703c3eb351a9169ffa99dbea88c7c0e4625b289afff9a3bc7a2ac10

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Moc2b:qmbhXDmjr5MOtEvwDpj5cDtKkQZQz

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-27_1d6d4c9e73c02e6f1889d9657f4fc3e4_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections