General

  • Target

    2024-02-25_096dccafee435cf3e1c1511f53a98bf5_cryptolocker

  • Size

    61KB

  • MD5

    096dccafee435cf3e1c1511f53a98bf5

  • SHA1

    157ad7a7654514630f1df386354d5c1a9b34470d

  • SHA256

    30b30aa0c09c82a73f4e63c93f766c5ff88593cec294f692adbda84a43cc610c

  • SHA512

    d76b3b5c482fc3b7910dd1446e2dc68cfc8bbc27b466fd8c93f68ba9a5a358bf16fd10508691146a2c0cca79ed8a03a49ea7ce13d21fbe0673b61f4aff2115a5

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtst0Z:BbdDmjr+OtEvwDpjM8e

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-25_096dccafee435cf3e1c1511f53a98bf5_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections