General

  • Target

    2024-02-19_9aef0e0bc9dc109f5a95ea3f50754b00_cryptolocker

  • Size

    46KB

  • MD5

    9aef0e0bc9dc109f5a95ea3f50754b00

  • SHA1

    0717e837df06bc9a89b5e4793ed985b8f93714e0

  • SHA256

    c3a76856edb03c9fe17054c99f57691991fb2bfa245d424eb8933c4f21605238

  • SHA512

    6b812afe7f03261b960a52d5fc24ab8a68fd5d4021a0239fca7e77456b33dac89877a1f974eea386c74c0077367d09ed39f214d39417d3d2a9d5096391995375

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MoH:qmbhXDmjr5MOtEvwDpj5cDtKkQZQZ

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-19_9aef0e0bc9dc109f5a95ea3f50754b00_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections