General

  • Target

    2024-02-17_9c8011ba15bb4ade5924840d016ac69b_cryptolocker

  • Size

    31KB

  • MD5

    9c8011ba15bb4ade5924840d016ac69b

  • SHA1

    3b746cbbea82a1ff0cb1f01d57db520e0524e099

  • SHA256

    4a1af4e75f26de2666f34f74b7685a5ee2d83a32c9a78f5883f4489bc3306ced

  • SHA512

    7e6663698bc8bd7b1bd3aa370bde05950eb8678ff68a992ef5e9abbd1dccaf615675aa8718d9d174be1efa9b37e54343c0b639f6455611f483e5e13cde5f3775

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIOc+jHg:q0zizzOSxMOtEvwDpj/ar1g

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_9c8011ba15bb4ade5924840d016ac69b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections