General

  • Target

    2024-02-03_9af59bdae70087e8e48a495929fcc042_cryptolocker

  • Size

    46KB

  • MD5

    9af59bdae70087e8e48a495929fcc042

  • SHA1

    a29cf261e431706678e6acec47d5144318db2990

  • SHA256

    1b070ed839ce578994c7844375ba4a1444136e63ebc0876bcdeeaf918fcd485d

  • SHA512

    3d034e7fda28f3184090e31bc0c7817aed719bcfa447d1f6678548ef183d83911ab8372e366ac41eff221ca6fef41823ead14a8acf9c875fe46cdb4dca55fe27

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2Mo22q:qmbhXDmjr5MOtEvwDpj5cDtKkQZQJq

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-03_9af59bdae70087e8e48a495929fcc042_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections