General

  • Target

    2024-02-12_9ed4e8b785d7828e2ec8242771d14816_cryptolocker

  • Size

    28KB

  • MD5

    9ed4e8b785d7828e2ec8242771d14816

  • SHA1

    d15f8d2a81a30519a169a8ed9ec8a53dd5bc1a02

  • SHA256

    05ab12809b988a082d3ce1cf271d82f0912a777348e3914521b85a20f37b7559

  • SHA512

    f4048852dc90cfbf7c87c564a1de60c7a16ebf8d955ead352f76798279a61c41b377f57d2a9a7af7c182e5d6b1b394f89b6a27303ed77321f4eb6b4d87902934

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+3i:q0zizzOSxMOtEvwDpj/arw

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_9ed4e8b785d7828e2ec8242771d14816_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections