General

  • Target

    2024-02-17_7f9d17837110094f96b998d7fe2eb9d0_cryptolocker

  • Size

    30KB

  • MD5

    7f9d17837110094f96b998d7fe2eb9d0

  • SHA1

    6f1698ed5d55062298241a65aad70da7003b18fb

  • SHA256

    a5e5e825d5686bdddc0ec5519121f2bcdc462860afd46a0cd737819dfa0a2e41

  • SHA512

    ec237d42ea55702ddec09283592558a90b25d5e5a12c9fc3a0dd448088f66e06013c058c4c570481421ca8237cf8faf2d8f851de3b1a9a32fd14b1a809459e4f

  • SSDEEP

    768:q0ZziOWwULueOSdE8tOOtEvwDpjeWaJIO/xTO:q0zizzOSxMOtEvwDpj/ar4

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-17_7f9d17837110094f96b998d7fe2eb9d0_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections