General

  • Target

    2024-02-23_a9b04a898f90fe70a2192678ec37c45b_cryptolocker

  • Size

    61KB

  • MD5

    a9b04a898f90fe70a2192678ec37c45b

  • SHA1

    6ef36ccdff5b8ed89aa5dbfe781b0f3078672814

  • SHA256

    971dbe96188b2d302c0a99a8f2b6575c565342eaf26571a7c05baac62a10f6c0

  • SHA512

    cea2c0d42dc0b2cf595ea5e8ac652d9cba61765019b484f140dcc098dabb5b1c0633f5d43a9146689a0b5484908317563e64e31af30ea4fe0a59578ce1bc02ea

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtskP8+:BbdDmjr+OtEvwDpjM8W

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-23_a9b04a898f90fe70a2192678ec37c45b_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections