General

  • Target

    2024-02-19_aa1c94b4eadf0a8b1b2d6aec0c09f52c_cryptolocker

  • Size

    46KB

  • MD5

    aa1c94b4eadf0a8b1b2d6aec0c09f52c

  • SHA1

    f981b04437a5a770b75e4cec48a7d387ba2a26f6

  • SHA256

    7dbd828d445fa3da4b085e0f7c14cf86587372dc3bbba24f05bbd0f07989e01e

  • SHA512

    e39c560a5646ed4708d9047ec56f661ccdd82b245cedd9dbc7655e68c2e3e39ed543d906736ee35274e43d0c70f912a5475f4a38f36a5922b3de0478d85c5bb3

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoS:qmbhXDmjr5MOtEvwDpj5cDtKkQZQY

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_aa1c94b4eadf0a8b1b2d6aec0c09f52c_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections