General

  • Target

    2024-05-30_c0046380e659b48448f16b1e4a34c097_cryptolocker

  • Size

    51KB

  • MD5

    c0046380e659b48448f16b1e4a34c097

  • SHA1

    c2ba2c5afc5bd5f4428d3c80f0e56d2796073e5d

  • SHA256

    4f586fad37f1b1149f304df4f8a3f2d2fa83d45d02f2fafa42fbb2deadf1bbac

  • SHA512

    d06035f4bb52791278d71b0ba9f1517069365dc63c8837401a5d422688b79cb7d2515de91fe7c3b4b8083c47b3aa3b1124def8b8857b2bc70daa3af499434a25

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mocc7:qmbhXDmjr5MOtEvwDpj5cDtKkQZQd

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-30_c0046380e659b48448f16b1e4a34c097_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections