General

  • Target

    2024-05-20_522f92f93959f9eefa6680b78ac15322_cryptolocker

  • Size

    51KB

  • MD5

    522f92f93959f9eefa6680b78ac15322

  • SHA1

    844f232d5402839de8fe57d209af4f221449d303

  • SHA256

    c0c8ec7a031412823be559b5798da99792d8dee93cc8fa2987eaa18a65926493

  • SHA512

    2fafc44f66ba6192efa8240d9f0f69de87f640e0b56f8cf4fa065b394fb712d65de4cef7e9b9d245202a4daa70d0a5f2e736db0ff1e566d34456d37f1359e1dd

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Moc5P:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ+P

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-20_522f92f93959f9eefa6680b78ac15322_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections